skip to main content
10.1145/952532.952715acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Self-manifestation of composite multimedia objects to satisfy security constraints

Published:09 March 2003Publication History

ABSTRACT

A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. These constraints include synchronization and spatial relationships between components, as well as the confidentiality and integrity requirements on each component. While spatial and synchronization constraints are to preserve the semantics of the cmo, the security (confidentiality and integrity) constraints are to represent the access control policies and fidelity requirements. A subject (user) requesting access for a cmo may not possess the required credentials to meet the confidentiality constraints, or his computer system the desired capabilities to meet the integrity constraints. This necessitates modification to the original cmo.In this paper, we present a self-manifestation approach in which composite multimedia objects automatically manifest themselves to cater to the subjects' credentials, and the capabilities of their computer systems. We accomplish this in two steps. First, we present a logical model which is an enhanced Petri Net model, called multimedia color-time Petri net (MMCTPN) to represent the components as well as the constraints of the cmo. We then demonstrate how MMCTPN lends itself to automatic manifestation of the cmo when subject's credentials and capabilities activate it. Second, we show how the Petri net behavior can be implemented using the Synchronized Multimedia Integration Language (SMIL): SMIL, which is an extension of XML, supports specification of synchronization of the multimedia components and facilitates automatic rendering. When credentials are specified with digital certificates in some XML format, our system automatically modifies the SMIL document to satisfy the security constraints. We avoid multiple certificate verifications at the component sources by generating a single security token, when multiple credentials are required to view a component.

References

  1. J. F. Allen. Towards a general theory of action and time. Artifical Intelligence, 23(2):123--154, 1984.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Frederic Andres. Multimedia Content Protection by Cryptography and Watermarking in Tamper-resistant Hardware,. In ACM Workshop on Multimedia, 11 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Vijay Atluri, Nabil Adam, Ahmed Gomaa and Igg Adiwijaya, Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constratints,. In CIMIC Technical report 67--301, 03 2001. http://cimic.rutgers.edu/publication-twp.html]]Google ScholarGoogle Scholar
  4. Frederic Andres. Guest Editor's Introduction,. Multimedia and Security, 8(4), 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Controlled Access and Dissemination of XML Documents. In 2nd ACM Workshop on Web Information and Data Management (WIDM'99), November 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Bertino, E. Ferrari, and M. Stolf. MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations. IEEE Transactions on Knowledge and Data Engineering, 12(1):102--125, January 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. S. Candan, B. Prabhakaran, and V. S. Subrahmanian. CHIMP: A Framework for Supporting Distributed Multimedia Document Authoring and Presentation. In Proc. ACM Multimedia Conf., pages 320--340, Nov 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. AuthXML Technical Committee. AuthXML: A Specification for Authentication Information In XML. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google ScholarGoogle Scholar
  9. SAML Technical Committee. Security Assertion Markup Language. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google ScholarGoogle Scholar
  10. XACML Technical Committee. eXtensible Access Control Markup Language. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google ScholarGoogle Scholar
  11. E. Damiani, S. De Capitani, di Vimercati, S. Paraboschi, and P. Samarati. Design and Implementation of an Access Control Processor for XML Documents. In Proc. of the Ninth International World Wide Web Conference (WWW9), May 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Securing XML Documents. In Proc. of the 2000 International Conference on Extending Database Technology (EDBT2000), March 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Ferrari E. Bertino, S. Castano and M. Mesiti. Specifying and Enforcing Access Control Policies for XML Document Sources,. World Wide Web Journal, 3(3), 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Nabil R. Adam and Vijayalakshmi Atluri and Igg Adiwijaya and Sujata Banerjee", A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects,. IEEE Transactions on Knowledge and Data Engineering, 13(4), 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. L. Hamblin. Instants and Intervals. Stadium Generale, 27:127--134, 1971.]]Google ScholarGoogle Scholar
  16. I. IEC and D. MHEG. Mheg object representation. In ISO/IEC DIS 13522-1: MHEG Part 1, MHEG Object Representation, Base Notation, August 1994.]]Google ScholarGoogle Scholar
  17. IEC/ISO. Hypermedia/time-based structuring language (hytime). In ISO/IEC IS 10744, 1992.]]Google ScholarGoogle Scholar
  18. Masayo Kaji and Kuniaki Uehara. Creating Multimedia Presentation Based on Constraint Satisfaction Problems in Multimedia Databases. In Proc. the 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE'99), Nov 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Kudo and S. Hada. XML Document Security based on Provisional Authorization. In Proc. of ACM Conference on Computer and Communication Security (CCS 2000), Nov 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Lemlouma and N. Layada. A Framework for Media Resources Manipulation in an Adaptation and Negotiation Architecture. Technical report, OPERA Project -INRIA Rhne-Alpes Research Unit., September 2001.]]Google ScholarGoogle Scholar
  21. T. Lemlouma and N. Layada. Modeling and Analysis of Workflows Using Petri Nets. Technical report, OPERA Project -INRIA Rhne-Alpes Research Unit., September 2001.]]Google ScholarGoogle Scholar
  22. Thomas D. C. Little and Arif Ghafoor. Synchronization and Storage Models for Multimedia Objects. IEEE Journal on Selected Areas in Communications, 8(3):413--427, 1990.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Rakesh Mohan, John R. Smith, and Chung-Sheng Li. Adapting Multimedia Internet Content for Universal Access. IEEE Transactions on Multimedia, 1(1):104--114, 1999.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. W3C Recommendation. Synchronized Multimedia Integration Language (SMIL 2.0) Specification. In (http://www.w3.org/TR/smil20/), August 2001.]]Google ScholarGoogle Scholar
  25. s2ml Technical Committee. Security Services Markup Language. Technical report, Organization for the Advancement of Structured Information Standards, 2002.]]Google ScholarGoogle Scholar
  26. Yoav Shoham. Reasoning about Change, Time and Causation from the Standpoint of Artificial Intelligence. The MIT Press, Cambridge, MA, 1988.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jerry Z. Gao Simon S. Y. Shim and Ying Wang. Multimedia Presentation Components in E-Commerce. In Proc. of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), June 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
    March 2003
    1268 pages
    ISBN:1581136242
    DOI:10.1145/952532

    Copyright © 2003 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 March 2003

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader