Secure Content Management In Ambient Environments- how about(7)
时间:2025-07-12
时间:2025-07-12
In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carrie
[Cho02b]
[C1a02]
[DamO2]
[Dev01]
[EC]
[Fie00]
[HacOl ]
[LenO2]
[Mar02]
[Maz99]
[Mer87]
[NurO2]
[PetO 1 ]
[PetO2a]C. N. Chong, Y. W. Law, S. Etalle, and nguage and framework for calculating licenses on information overHartelLicenseScript - aconstrained domains.TelematicaTechnical report TR-CTIT-02-37, Centre forNetherlands, Oct 2002.and InformationTechnology,Univ.ofTwente,TheI.Protecting free expression online with freenet. IEEE Internet Computing,Clarke,Th.W. Hong, S. G. Miller, O. Sandberg, and B. Wiley.6(1):40--49, 2002.E. Damiani, S. De CapitaniA Fine-Grained Access Control System for XML Documents. ACMDiVimercati, S. Paraboschi and P. Samarati.Transactions on Information and System Security, 5(2): 169-202, May2002.P.Stubblebine. Flexible Authentication of XML Documents. In ACM Intl.Devanbu,M. Gertz, A. Kwong, C.Martel,G.Nuckolls and S.Conference on Computer and Communication Security, Philadelphia,Nov.European Commission, Scenarios for Ambient Intelligence in 2010.2001.A. N. Field, P. H.personalised content delivery. In 10thHartel,and W. Mooij. Personal DJ, an architecture forH. Hacigumus, B. Iyer, C.1--8,Hongkong,May 2001. ACM press, New York.Int.World Wide Web Conf., pagesLi,Management of Data and Symposium on Principles of Database Systems,encrypted data in the database service provider model. Inand S. Mehrotra.Executing SQL overInt.Conf. onpages 216--227, Madison, Wisconsin, Jun 2002. ACM Press, New York.SecureS.A.F.A. van denContentManagement in Authorised Domains, P.J. Lenoir,September, 2002, Amsterdam.Heuvel,F.L.A.J.Kamperman, W.Jonker,IBC2002,J.M. Martinet. Overview of MPEG-7 Standard.2002.JulyD. Mazieres, D. Kaminsky, M.management from file system security. In 17th ACM Symposium onKaashoek,and E. Witchel. Separating keyOperating Systems Principles (SOSP), pages 124--139. ACM Press, NewYork,R. C. Merkle.Dec1999.function. In C. Pomerance, editor, Advances in Cryptology (CRYPTO),A digital signature based on a conventional encryptionN.U. Maulidevi. Conditional Access to Video Content Using Metadata.volume LNCS 293, pages 369--378.Springer-Verlag,Berlin,Aug1987.Master Thesis, University ofM. Petkovic,Twente,The Netherlands. 2002.Video Events",W.Track ofMultimedia Computing and Information ManagementJonker,"Content-Based Retrieval ofSpatin-Temporal
M. Petkovic, R.IRMAInternational Conference, Toronto, Canada, May 2001.Windhouwer,M.Kersten,Zwol,H. E."Content-based Video Indexing for the SupportBlok,W.Jonker,P.M. G. Apers, M.
…… 此处隐藏:730字,全部文档内容请下载后查看。喜欢就下载吧 ……上一篇:敦煌写本张仲景_五脏论_考辨
下一篇:支气管哮喘的合理用药