ABSTRACT
A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. These constraints include synchronization and spatial relationships between components, as well as the confidentiality and integrity requirements on each component. While spatial and synchronization constraints are to preserve the semantics of the cmo, the security (confidentiality and integrity) constraints are to represent the access control policies and fidelity requirements. A subject (user) requesting access for a cmo may not possess the required credentials to meet the confidentiality constraints, or his computer system the desired capabilities to meet the integrity constraints. This necessitates modification to the original cmo.In this paper, we present a self-manifestation approach in which composite multimedia objects automatically manifest themselves to cater to the subjects' credentials, and the capabilities of their computer systems. We accomplish this in two steps. First, we present a logical model which is an enhanced Petri Net model, called multimedia color-time Petri net (MMCTPN) to represent the components as well as the constraints of the cmo. We then demonstrate how MMCTPN lends itself to automatic manifestation of the cmo when subject's credentials and capabilities activate it. Second, we show how the Petri net behavior can be implemented using the Synchronized Multimedia Integration Language (SMIL): SMIL, which is an extension of XML, supports specification of synchronization of the multimedia components and facilitates automatic rendering. When credentials are specified with digital certificates in some XML format, our system automatically modifies the SMIL document to satisfy the security constraints. We avoid multiple certificate verifications at the component sources by generating a single security token, when multiple credentials are required to view a component.
- J. F. Allen. Towards a general theory of action and time. Artifical Intelligence, 23(2):123--154, 1984.]] Google ScholarDigital Library
- Frederic Andres. Multimedia Content Protection by Cryptography and Watermarking in Tamper-resistant Hardware,. In ACM Workshop on Multimedia, 11 2000.]] Google ScholarDigital Library
- Vijay Atluri, Nabil Adam, Ahmed Gomaa and Igg Adiwijaya, Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constratints,. In CIMIC Technical report 67--301, 03 2001. http://cimic.rutgers.edu/publication-twp.html]]Google Scholar
- Frederic Andres. Guest Editor's Introduction,. Multimedia and Security, 8(4), 2001.]] Google ScholarDigital Library
- E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Controlled Access and Dissemination of XML Documents. In 2nd ACM Workshop on Web Information and Data Management (WIDM'99), November 1999.]] Google ScholarDigital Library
- E. Bertino, E. Ferrari, and M. Stolf. MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations. IEEE Transactions on Knowledge and Data Engineering, 12(1):102--125, January 2000.]] Google ScholarDigital Library
- K. S. Candan, B. Prabhakaran, and V. S. Subrahmanian. CHIMP: A Framework for Supporting Distributed Multimedia Document Authoring and Presentation. In Proc. ACM Multimedia Conf., pages 320--340, Nov 1996.]] Google ScholarDigital Library
- AuthXML Technical Committee. AuthXML: A Specification for Authentication Information In XML. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google Scholar
- SAML Technical Committee. Security Assertion Markup Language. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google Scholar
- XACML Technical Committee. eXtensible Access Control Markup Language. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google Scholar
- E. Damiani, S. De Capitani, di Vimercati, S. Paraboschi, and P. Samarati. Design and Implementation of an Access Control Processor for XML Documents. In Proc. of the Ninth International World Wide Web Conference (WWW9), May 2000.]] Google ScholarDigital Library
- E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Securing XML Documents. In Proc. of the 2000 International Conference on Extending Database Technology (EDBT2000), March 2000.]] Google ScholarDigital Library
- E. Ferrari E. Bertino, S. Castano and M. Mesiti. Specifying and Enforcing Access Control Policies for XML Document Sources,. World Wide Web Journal, 3(3), 2000.]] Google ScholarDigital Library
- Nabil R. Adam and Vijayalakshmi Atluri and Igg Adiwijaya and Sujata Banerjee", A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects,. IEEE Transactions on Knowledge and Data Engineering, 13(4), 2001.]] Google ScholarDigital Library
- C. L. Hamblin. Instants and Intervals. Stadium Generale, 27:127--134, 1971.]]Google Scholar
- I. IEC and D. MHEG. Mheg object representation. In ISO/IEC DIS 13522-1: MHEG Part 1, MHEG Object Representation, Base Notation, August 1994.]]Google Scholar
- IEC/ISO. Hypermedia/time-based structuring language (hytime). In ISO/IEC IS 10744, 1992.]]Google Scholar
- Masayo Kaji and Kuniaki Uehara. Creating Multimedia Presentation Based on Constraint Satisfaction Problems in Multimedia Databases. In Proc. the 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE'99), Nov 1999.]] Google ScholarDigital Library
- M. Kudo and S. Hada. XML Document Security based on Provisional Authorization. In Proc. of ACM Conference on Computer and Communication Security (CCS 2000), Nov 2000.]] Google ScholarDigital Library
- T. Lemlouma and N. Layada. A Framework for Media Resources Manipulation in an Adaptation and Negotiation Architecture. Technical report, OPERA Project -INRIA Rhne-Alpes Research Unit., September 2001.]]Google Scholar
- T. Lemlouma and N. Layada. Modeling and Analysis of Workflows Using Petri Nets. Technical report, OPERA Project -INRIA Rhne-Alpes Research Unit., September 2001.]]Google Scholar
- Thomas D. C. Little and Arif Ghafoor. Synchronization and Storage Models for Multimedia Objects. IEEE Journal on Selected Areas in Communications, 8(3):413--427, 1990.]]Google ScholarDigital Library
- Rakesh Mohan, John R. Smith, and Chung-Sheng Li. Adapting Multimedia Internet Content for Universal Access. IEEE Transactions on Multimedia, 1(1):104--114, 1999.]]Google ScholarDigital Library
- W3C Recommendation. Synchronized Multimedia Integration Language (SMIL 2.0) Specification. In (http://www.w3.org/TR/smil20/), August 2001.]]Google Scholar
- s2ml Technical Committee. Security Services Markup Language. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google Scholar
- Yoav Shoham. Reasoning about Change, Time and Causation from the Standpoint of Artificial Intelligence. The MIT Press, Cambridge, MA, 1988.]] Google ScholarDigital Library
- Jerry Z. Gao Simon S. Y. Shim and Ying Wang. Multimedia Presentation Components in E-Commerce. In Proc. of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), June 2000.]] Google ScholarDigital Library
Recommendations
Multimedia Presentation Components in E-Commerce
WECWIS '00: Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000)Synchronized Multimedia Integration Language (SMIL) is a recommendation developed by the Synchronized Multimedia Working Group in the World Wide Web Consortium (W3C). SMIL is a simple and standard way to specify a timeline based synchronized multimedia ...
Nine methods to extend SMIL for multimedia applications
The SMIL 2.0 multimedia standard has been designed for use on the Web. It supports keyboard and mouse as input devices. Typically, SMIL players can play out text, images, audio, and video. SMIL also has a strong support for declarative synchronization ...
Multimedia systems security
MM&Sec '07: Proceedings of the 9th workshop on Multimedia & securityMultimedia data and information systems manage, communicate, and present multimedia data including text, images, audio and video. We need to ensure that the data is protected from unauthorized access as well as malicious corruption. Digital watermarking ...
Comments