Skip to search formSkip to main contentSkip to account menu

High-water mark (computer security)

Known as: Low watermark (computer security), High watermark, Low watermark 
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
With the increasing demand for real-time system monitoring and tracking in various contexts, the amount of time-stamped event… 
2016
2016
This comment critically analyses the justification and operation of the ‘advocating terrorism’ offence quietly introduced into s… 
2009
2009
In this paper, a novel transform-based, blind and robust 3-D mesh watermarking scheme is presented. The 3-D surface of the mesh… 
2008
2008
In this work, we present a new content-based watermarking approach that uses geometric warping to embed watermarks with high… 
2006
2006
Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly… 
Review
2004
Review
2004
Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for… 
2004
2004
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The… 
Highly Cited
2003
Highly Cited
2003
  • G. Stoker
  • 2003
  • Corpus ID: 40572917
Highly Cited
2002
Highly Cited
2002
We present a new approach to the virtual-topology reconfiguration problem for wavelength-routed, optical wide-area networks under…