SHIP Secure Heterogeneous Information Presentation Marc Bezem PUT.ii.uib
The Internet Many servers connected to even more clients: a bewildering variety
Heterogeneity content: data, programs, text, sound, images, video hardware: from servers to mobile phones communication: bandwidth, security,… preferences: no/color, no/sound, braille, only the headlines,..
``Only´´ security encryption (low sec. – high sec.) public/private key signatures trusted third party protected against modification, redirection, …
Main Goal of SHIP Advancing the state of the art of network technology by developing a flexible framework for handling data and organizing software for heterogeneous content on heterogeneous platforms. Or, more modestly, …
Main Test Vehicle E-learning system developed by Mughal at II/UiB –multi-media content –content-independent –secure (privacy, exams) Prototyping extensions of this system in order to test new ideas
Status per Today Still in the initial phase ( ) 2 PhD fellows appointed: –Paul Simon Svanberg ( ), Security and Agent Logics (Sect.2.4.3) –Dag Hovland ( ), Inclusion relation for XML schemas (Sect.2.4.1/2) Vacancy for a research associate
Related Activities Collaboration with HiB: PhD fellow Adrian Rutle working on Diagram techniques for design and formalization of presentation patterns (Sect.2.4.1) Upcoming: cooperation with Vesta
Inclusion relation for XML schemas XML: a flexible language for representing heterogeneous content XML schemas: define valid XML documents Dynamic Presentation: XML schemas may change Q: which XML documents stay valid?
XML schemas, ctnd A1: test all your documents again (costly) A2: test a syntactic inclusion relation between the old and the new schema Problems: –Define `syntactic inclusion´ –Prove `syntactic´ implies `semantic´ inclusion –Find an algorithm to test syntactic inclusion (compare efficiency to testing all documents)
Security and Agent Logics Identification of a `Security Language´: –Abstraction mechanisms for security –Specification of security objectives –Validation wrt security objectives Make Agent Logics a suitable framework Simple example: if agent A knows an encrypted message, then he knows the message itself only if he also knows the key
Agent Logics (ctnd) Typical example: If A sends an encrypted message to B. How can A be sure that B has received the message? (missing key, failing communication) Challenges: flexibility, diversity
The End