Secure Content Management In Ambient Environments- how about(4)

时间:2025-07-12

In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carrie

before answering the query, a two step approach is chosen: first a rough filtering,followed by decryption and querying.

Fig.2.Query Execution over Encrypted Document Set

Detailed research questions to answer include: Which are suitable cryptographic and non-cryptographic protection techniques forencodingXML documents that contain meta-data, profiles, or contextinformation? Which of these techniques allow effective pre-filtering as described in Fig.2. What kind of pre-filtering methods can be used, and what is the selectivity ofthese pre-filtering methods? Should the techniques be conservative in the sense that filtering never yields toolittle information? Is there a trade-off possible between document decryption and query encryption? What attacks are possible on the process, can we model and predict those, andwhat measures are possible to defend against the attacks?

Again, the research will be complemented by more system oriented research focusing onthe realization of the above techniques in an ambient system environment. Questions are: How can the above techniques be implemented in a distributed environment? What kind of additional system security measures have to be taken in such anenviroment?

Secure Content Management In Ambient Environments- how about(4).doc 将本文的Word文档下载到电脑

精彩图片

热门精选

大家正在看

× 游客快捷下载通道(下载后可以自由复制和排版)

限时特价:7 元/份 原价:20元

支付方式:

开通VIP包月会员 特价:29元/月

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219