Secure Content Management In Ambient Environments - how about security and meta data?

Introduction In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carried out by two PhD students that will be jointly supervised by Prof. Dr. Willem Jonker (Philips/UT) and Prof. Dr. Pieter Hartel (UT). This document gives a description of the work.

[1]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[2]  Menzo Windhouwer,et al.  Flexible and scalable digital library search , 2001, VLDB.

[3]  David Chaum,et al.  Achieving Electronic Privacy , 1992 .

[4]  Shih-Fu Chang,et al.  Overview of the MPEG-7 standard , 2001, IEEE Trans. Circuits Syst. Video Technol..

[5]  Barry Smyth,et al.  A personalized television listings service , 2000, CACM.

[6]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[7]  Pieter H. Hartel,et al.  Personal DJ, an architecture for personalised content delivery , 2001, WWW '01.

[8]  DamianiErnesto,et al.  A fine-grained access control system for XML documents , 2002 .

[9]  Yee Wei Law,et al.  LicenseScript : a language and framework for calculating licenses on information over constrained domains , 2002 .

[10]  Martín Abadi,et al.  On hiding information from an oracle , 1987, STOC '87.

[11]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[12]  Willem Jonker,et al.  Content-Based Retrieval of Spatio-Temporal Video Events , 2001 .

[13]  Menzo Windhouwer,et al.  Content-based video indexing for the support of digital library search , 2002, Proceedings 18th International Conference on Data Engineering.

[14]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[15]  Milan Petkovic,et al.  Multi-modal extraction of highlights from TV Formula 1 programs , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[16]  Michael Gertz,et al.  Flexible authentication of XML documents , 2001, CCS '01.

[17]  Elisa Bertino,et al.  Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.

[18]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[19]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.