Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/764792.764801acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Regulating access to SMIL formatted pay-per-view movies

Published:22 November 2002Publication History

ABSTRACT

XML [15] has become a standard format for information that moves within the World Wide Web. Previous work in securing XML documents concentrated mainly on textual documents. Those proposals are ineffective in the context of multimedia, which mostly comprises of some sensible combination of images, text, audio, and video. As multimedia constitutes a significant component of the traffic within the Internet, it requires to be secured. We propose an access control model and an encryption mechanism that enforces access control and maintains integrity of multimedia by using the Synchronized Multimedia Integration Language (SMIL)[1], thereby preventing illegal or malicious unauthorized access or modifications to the media documents in transition. We show its utility in safeguarding pay-per-view movies and multi-level secure coalitions observing unfolding scenarios.

References

  1. J.Ayers et al. "Synchronized Multimedia Integration Language (SMIL 2.0)". World Wide Web Consortium (W3C). http://www.w3.org/TR/smil20/ (August 2001).]]Google ScholarGoogle Scholar
  2. E. Bertino, B. Carminati, E. Ferrari. "XML Security" in Information Security Technical Report, Vol 6, No 2(2001) Pages 44--58.]]Google ScholarGoogle Scholar
  3. A. Gabillon, E. Bruno. Regulating Access to XML documents. in Proc. IFIP WG11.3 Working Conference on Database Security, Niagara on the Lake, Ontario, Canada, July 15--18, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Bertino, S. Casatano, E. Ferrari "Securing XML Documents with Author-X" in IEEE Internet Computing, vol 5,no3 May/June 2001]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti. "AuthorX: A Java-Based System for XML Data Protection". In Proc. of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Bertino, S. Castano, E. Ferrari and M. Mesiti. "Specifying and Enforcing Access Control Policies for XML Document Sources". World Wide Web Journal, vol. 3, n. 3, Baltzer Science Publishers.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dan Boneh, Matthew Franklin "An Efficient Public Key Traitor Tracing Scheme" in Eurocrypt 99.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Amos Fiat, Tamir Tassa "Dynamic Traitor Tracing" Pages 211--223 The Journal of Cryptography, April 2001.]]Google ScholarGoogle Scholar
  9. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Securing XML Documents," in Proc. of the 2000 International Conference on Extending Database Technology (EDBT2000), Konstanz, Germany, March 27--31, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Damiani, S. De Capitani di Vimercati, E. Fernandez-Medina, P. Samarati "An Access Control System for SVG Documents" in Proc. IFIP WG11.3 Working Conference on Database Security, King's College, and Cambridge, England]]Google ScholarGoogle Scholar
  11. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Controlling Access to XML Documents," in IEEE Internet Computing, vol. 5, n. 6, November/December 2001, pp. 18--28.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati "XML Access Control Systems: A Component-Based Approach" in Proc. IFIP WG11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 21--23, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Clark et al. "XML Path Language (XPath) Version 1.0". World Wide Web Consortium (W3C). http://www.w3c.org/TR/xpath (November 1999).]]Google ScholarGoogle Scholar
  14. J. Clark et al. "XSL Transformations (XSLT) Version 1.0". World Wide Web Consortium (W3C). http://www.w3c.org/TR/xslt (November 1999).]]Google ScholarGoogle Scholar
  15. T. Bray et al. "Extensible Markup Language (XML) 1.0". World Wide Web Consortium (W3C). http://www.w3c.org/TR/REC-xml (October 2000).]]Google ScholarGoogle Scholar
  16. A.G. Stoica and Csilla Farkas. "Secure XML Views" in Proc. IFIP WG11.3 Working Conference on Database Security, King's College, Cambridge, England.]]Google ScholarGoogle Scholar
  17. Michiharu Kudo and Satoshi Hada, "XML Document Security based on Provisional Authorization", 7th ACM Conference on Computer and Communication Security, pages 87--96, Nov. 2000]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. ContentGaurd " eXtensible rights Markup Language(XrML)" http://www.xrml.org]]Google ScholarGoogle Scholar

Index Terms

  1. Regulating access to SMIL formatted pay-per-view movies

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      XMLSEC '02: Proceedings of the 2002 ACM workshop on XML security
      November 2002
      109 pages
      ISBN:1581136323
      DOI:10.1145/764792

      Copyright © 2002 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 November 2002

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader