Authorization in Multimedia Conferencing Systems

  • E. B. Fernandez
  • P. D. Chien
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)


Multimedia conferencing has been making significant progress in recent years. In the application of multimedia conferencing there are many situations that pose some intricate security problems; for example, a secret meeting of the defense department, a negotiating conference among different commercial groups, etc.. However, there are few studies that address the security of multimedia applications. Good solutions to these critical aspects will increase with the popularity of multimedia, since these systems may handle an enormous amount of information with a large variety of users. We present an authorization model for a multimedia conferencing system. The Object Modeling Technique (OMT) is used here to describe the static aspects of this model, where the authorization model is represented by a set of classes and their relationships. We also discuss some aspects of security administration and a possible implementation.


Access Control Access Mode Authorization Model Authorization Rule Access Type 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [Blai 94]
    G. Blair, P. Dark, N. Davies, J. Mariani, and C. Snape, “Integrated Support for Complex Objects in a Distributed Multimedia Design Environment”, JOOP, vol. 5, No. 8, Jan. 1994, pp. 30–37.Google Scholar
  2. [Chie 95]
    P. D. Chien, and E. B. Fernandez, “Object-Oriented Modeling of Multimedia Conferencing Systems”, Department of Computer Science and Engineering, Florida Atlantic University, Rept TR-CSE-94–14, February, 1995.Google Scholar
  3. [Ellm 94]
    E. Ellmer, G. Pernul, G. Quirchmayr, and A. M. Tjoa, “Access Controls for Cooperative Environments”, Proc. Infrastructure Workshop, ACM CSCW conference, Chapel Hill, NC, Oct 1994.Google Scholar
  4. [Fern 81]
    E. B. Fernandez, R. C Summers, and C. Wood, “Database Security and Integrity”, Addison-Wesley, 1981.Google Scholar
  5. [Fern 93]
    E. B. Fernandez, M. M. Larrondo-Petrie, and E. Gudes, “A method-based authorization model for object-oriented databases”, In Proc. of the OOPSLA 1993 Workshop on Security in Object-Oriented Systems pp.70–79.Google Scholar
  6. [Fern 94]
    E. B. Fernandez, E. Gudes, and H. Song, “A model for evaluation and administration of security in object-oriented databases”, IEEE Trans. on Knowledge and Data Engineering, vol. 6, No. 2, April 1994, pp. 275–292.CrossRefGoogle Scholar
  7. [Gopa 92]
    G. Gopal, G. Herman, and M. P. Vecchi, “The Touring Machine Project: Toward A Public Network Platform For Multimedia Applications”, In Proceedings of the 8 th International Conference on Software Engineering Telecommunications Systems and Services, TEE, London, 1992, pp. 27–31.Google Scholar
  8. [LeeK 93]
    K. C. Lee, W. H. Mansfield Jr., and A. P. Sheth, “A Framework for Controlling Cooperative Agents”, Computer, vol. 26, No. 7, July 1993, pp. 8–15.CrossRefGoogle Scholar
  9. [OSF 92]
    Open Software Foundation, Introduction to OSF DCE, Prentice Hall, Englewood Cliffs, N.J., 1992.Google Scholar
  10. [Rang 91]
    P. V. Rangan and H. M. Vin, “Multimedia Conferencing as A Universal Paradigm for Collaboration”, In Multimedia — Principles, Systems, and Applications, Lars Kjelldahl (ed.), Chapter 14, Springer-Verlag, Apr. 1991.Google Scholar
  11. [Rumb 91]
    J. Rumbaugh, M. Blaha, W. Premerlani, F. Eddy and W. Lorensen. Object-Oriented Modeling and Design, Prentice Hall, Englewood Cliffs, NJ, 1991.Google Scholar
  12. [Thom 85]
    R. H. Thomas, H. C. Forsdick, T. R. Crowley, R. W. Schaaf, R. S. Tomlinson, V. M. Travers, and G. G. Robertson, “Diamond: A Multimedia Message System Built on a Distributed Architecture”, Computer, vol. 18, No. 12, December 1985, pp. 65–78.CrossRefGoogle Scholar
  13. [VinH 91]
    H. M. Vin, P. T. Zellweger, D. C. Swinehart, and P. V. Rangan, “Multimedia Conferencing in the Etherphone Environment”, Computer, vol. 24, No. 10, Oct. 1991, pp. 69–79.CrossRefGoogle Scholar
  14. [Zieg 90]
    C. Ziegler and G. Weiss, “Multimedia Conferencing on Local Area Networks”, Computer, vol. 23, No. 9, Sept. 1990, pp. 52–61.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 1995

Authors and Affiliations

  • E. B. Fernandez
    • 1
  • P. D. Chien
    • 1
  1. 1.Department of Computer Science & EngineeringFlorida Atlantic UniversityBoca RatonUSA

Personalised recommendations