Towards a general theory of action and time
Artificial Intelligence
Reasoning about change: time and causation from the standpoint of artificial intelligence
Reasoning about change: time and causation from the standpoint of artificial intelligence
CHIMP: a framework for supporting distributed multimedia document authoring and presentation
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Design and implementation of an access control processor for XML documents
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
IEEE MultiMedia
MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations
IEEE Transactions on Knowledge and Data Engineering
A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects
IEEE Transactions on Knowledge and Data Engineering
Creating Multimedia Presentation Based on Constraint Satisfaction Problems in Multimedia Databases
DANTE '99 Proceedings of the 1999 International Symposium on Database Applications in Non-Traditional Environments
Multimedia Presentation Components in E-Commerce
WECWIS '00 Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000)
Adapting multimedia Internet content for universal access
IEEE Transactions on Multimedia
DM-AMS: employing data mining techniques for alert management
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Open paper: caT: adapting and updating the trellis hypertext model
The New Review of Hypermedia and Multimedia
Hi-index | 0.00 |
A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. These constraints include synchronization and spatial relationships between components, as well as the confidentiality and integrity requirements on each component. While spatial and synchronization constraints are to preserve the semantics of the cmo, the security (confidentiality and integrity) constraints are to represent the access control policies and fidelity requirements. A subject (user) requesting access for a cmo may not possess the required credentials to meet the confidentiality constraints, or his computer system the desired capabilities to meet the integrity constraints. This necessitates modification to the original cmo.In this paper, we present a self-manifestation approach in which composite multimedia objects automatically manifest themselves to cater to the subjects' credentials, and the capabilities of their computer systems. We accomplish this in two steps. First, we present a logical model which is an enhanced Petri Net model, called multimedia color-time Petri net (MMCTPN) to represent the components as well as the constraints of the cmo. We then demonstrate how MMCTPN lends itself to automatic manifestation of the cmo when subject's credentials and capabilities activate it. Second, we show how the Petri net behavior can be implemented using the Synchronized Multimedia Integration Language (SMIL): SMIL, which is an extension of XML, supports specification of synchronization of the multimedia components and facilitates automatic rendering. When credentials are specified with digital certificates in some XML format, our system automatically modifies the SMIL document to satisfy the security constraints. We avoid multiple certificate verifications at the component sources by generating a single security token, when multiple credentials are required to view a component.