Secure Content Management In Ambient Environments- how about(5)
时间:2025-07-12
时间:2025-07-12
In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carrie
How can parts of the process be distributed of various system components,including low resource systems?
Work PlanAlthough each PhD student will have its own work plan, we envisage close co-operationbetween them in the areas of meta-data modeling, profile description, as well as contextdescription. In addition, we envisage close co-operation on the system-oriented research.Roughly the 4-year PhD research period will be divided as follows:In the phase an extensive literature study will take place to get a good overview on thestate-of-the-art in meta-data, cryptography, and secure system research. The second phasewill be devoted to development of methods, techniques, and algorithms to address theresearch question mentioned above. The third phase will be focused on system design,implementation, and validation. The final phase will consist of writing up the thesis.Relevant Techniques and Related Work
Meta-data for Audio/Video ContentMeta-data for Audio/Video content is a cornerstone technology for the project.Considerable research is currently done on meta-data for audio and video content. Thistakes places in various universities and standardization bodies (e.g. TV-Anytime,MPEG), where MPEG-7 [Mar02] is the most elaborated meta-data representation. Up tillnow the focus has been on exploitation of meta-data for querying and retrieval ([B1o01],[Pet01], [Pet02a], [Pet02b]) while little or no attention has been paid to exploitation forsecurity purposes [Nur02].
XML TechnologyThe fact that most meta-data representations use XML, makes XML technology veryrelevant for the project. Nowadays, XML has become the dominant standard indescribing and exchanging data over different systems and applications on the Internet.XML formats are increasingly used for organizing and describing multimedia metadataand as an interchanging language in protocols. These raise a wide spread of theoreticaland practical aspects of the security required for XML-based content management anddissemination, which range from specific security features, such as digital signatures,element-wise encryption and access control of XML data, to XML-based infrastructure,such as secure XML databases, encrypted query execution (XQuery) and performanceevaluation [W3C02a, W3C02b, Dam02, Dev01, Ber00].
Cryptographic TechnologyThere are many aspects of security that play a role in the project. We discuss the mostimportant ideas and some of their applications.
Hi stogrammingTo improve the privacy of data base queries, data can be mapped into categories,so that any searches on data reveal only whether a match with the category has
…… 此处隐藏:877字,全部文档内容请下载后查看。喜欢就下载吧 ……上一篇:敦煌写本张仲景_五脏论_考辨
下一篇:支气管哮喘的合理用药