第一范文网 - 专业文章范例文档资料分享平台

Secure Content Management In Ambient Environments- how about security and meta-data-(2)

来源:用户分享 时间:2021-06-02 本文由不如两清 分享 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carrie

order to give people trust in ambient intelligence. For that reason, in this project weaddress the relationship between security and meta-data from two angles:1.How can meta-data be exploited for security purposes; especially for ambientaccess purposes?2.What if meta-data needs to be secured it self: especially how to handle securedmeta-data?

To address these two questions, two PhD research positions are defined.

Ambient Content AccessThis research will address the question of how to exploit meta-data for ambient accesspurposes. The focus will be on conditional access to audio and video content, based onthe associated meta-data. The access should be ambient, based on the context in whichthe content is accessed in combination with the user accessing the content. As anexample, consider the viewing of news items that contain shocking scenes. An adult mayaccess this content (i.e. watch it), however a child may not. Also one may not want anadult to watch it in a public environment, given that there may be children around. Theresearch will focus on content, context, and user profiling techniques that enable thedevelopment of ambient content access systems. The work should build on techniquesknown from data modeling for context and personalization, multi-media meta-datamodeling (especially audio and video meta-data), and theory around conditional accessand digital rights management systems.

Detailed research questions to answer include: Which audio and video experience scenarios could conceivably play a role inambient access patterns? What kind of meta-data is needed to support these scenarios? Which parts of the meta-data are sensitive and thus relevant for security andprivacy? What kind of language (e.g. LicenseScript?) would be appropriate to describeambient access patterns? What kind of language (e.g. MPEG-7?) would be appropriate to describe meta-data? What kind of languages would be appropriate to describe context information? How can access pattern descriptions be linked to meta-data descriptions?

The above research questions will have to be complemented by some more systemoriented research. This starts from a global picture described in Figure 1.

搜索“diyifanwen.net”或“第一范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,第一范文网,提供最新IT计算机Secure Content Management In Ambient Environments- how about security and meta-data-(2)全文阅读和word下载服务。

Secure Content Management In Ambient Environments- how about security and meta-data-(2).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/wenku/1202608.html(转载请注明文章来源)
热门推荐
Copyright © 2018-2022 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top