Download presentation
Presentation is loading. Please wait.
Published byBruce James Modified over 8 years ago
1
SHIP Secure Heterogeneous Information Presentation Marc Bezem PUT.ii.uib
2
The Internet Many servers connected to even more clients: a bewildering variety
3
Heterogeneity content: data, programs, text, sound, images, video hardware: from servers to mobile phones communication: bandwidth, security,… preferences: no/color, no/sound, braille, only the headlines,..
4
``Only´´ security encryption (low sec. – high sec.) public/private key signatures trusted third party protected against modification, redirection, …
5
Main Goal of SHIP Advancing the state of the art of network technology by developing a flexible framework for handling data and organizing software for heterogeneous content on heterogeneous platforms. Or, more modestly, …
6
Main Test Vehicle E-learning system developed by Mughal at II/UiB –multi-media content –content-independent –secure (privacy, exams) Prototyping extensions of this system in order to test new ideas
7
Status per Today Still in the initial phase (2007-2010+) 2 PhD fellows appointed: –Paul Simon Svanberg (15.01.07), Security and Agent Logics (Sect.2.4.3) –Dag Hovland (01.04.07), Inclusion relation for XML schemas (Sect.2.4.1/2) Vacancy for a research associate
8
Related Activities Collaboration with HiB: PhD fellow Adrian Rutle working on Diagram techniques for design and formalization of presentation patterns (Sect.2.4.1) Upcoming: cooperation with Vesta
9
Inclusion relation for XML schemas XML: a flexible language for representing heterogeneous content XML schemas: define valid XML documents Dynamic Presentation: XML schemas may change Q: which XML documents stay valid?
10
XML schemas, ctnd A1: test all your documents again (costly) A2: test a syntactic inclusion relation between the old and the new schema Problems: –Define `syntactic inclusion´ –Prove `syntactic´ implies `semantic´ inclusion –Find an algorithm to test syntactic inclusion (compare efficiency to testing all documents)
11
Security and Agent Logics Identification of a `Security Language´: –Abstraction mechanisms for security –Specification of security objectives –Validation wrt security objectives Make Agent Logics a suitable framework Simple example: if agent A knows an encrypted message, then he knows the message itself only if he also knows the key
12
Agent Logics (ctnd) Typical example: If A sends an encrypted message to B. How can A be sure that B has received the message? (missing key, failing communication) Challenges: flexibility, diversity
13
The End
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.