Advertisement

High-Level Security Issues in Multimedia/Hypertext Systems

  • Eduardo B. Fernandez
  • Krishnakumar R. Nair
  • Maria M. Larrondo-Petrie
  • Yan Xu
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)

Abstract

Multimedia/hypertext systems are growing at an enormous rate. A large variety of trans­actions take place over the Internet. We have today different types of documents available as hypertext on the WWW for these transactions. WWW is the major platform for world-wide transfer of documents. The security of these documents is a top priority issue but this is a relatively neglected area. Most of the existing work focuses on low-level aspects. We look here at the high-level security measures available today, different combinations of security models, different types of documents and the effect of the system environment. We indicate directions for future research.

Keywords

Authorization Document Security Hypertext documents Multimedia Object-oriented Models World Wide Web 

References

  1. J.A.Bank, “Java Security”, http://www.mit.edu/jbank.Google Scholar
  2. T.Berners-Lee et al., “The World-Wide Web”, Comm. of the ACM, vol. 37, no. 8, August 1994, 76–82.CrossRefGoogle Scholar
  3. M.J.Briales, “Multiauthoring aspects”, Chapter 9 in Integrated management of technical documentation- The system SPRITE, J.Hoppe(Ed.), Springer Verlag, 1993.Google Scholar
  4. J.Biskup and H.H Bruggemann, “The personal model of data: towards a privacy oriented information system”, Computers and Security, vol. 7, 1988.Google Scholar
  5. S.Castano, M.G.Fugini, G.Martella, and P.Samarati, Database Security, Addison-Wesley, 1995.zbMATHGoogle Scholar
  6. B. Christianson, P.Hu and B.Snook, “File server architecture for an open distributed document system”, in Communications and Multimedia Security, R.Posch (Ed.), Chapman and Hall, 1995, 32–42.CrossRefGoogle Scholar
  7. J.H.P.Eloff, R.Holbein, and S.Teufel, “Security classification for documents”, to appear in Computers and Security, 1996.Google Scholar
  8. E.B.Fernandez, R.C.Summers and C.Wood, Database security and integrity Reading, MA: Addison-Wesley, Systems Programming Series, Feb. 1981.Google Scholar
  9. E.B.Fernandez, E.Gudes, and H.Song,“A model for evaluation and administration of security in object-oriented databaese”,IEEE Trans. on Data and Knowledge Engineering,vol. 6,no. 2, April 1994, 275–292.CrossRefGoogle Scholar
  10. E.B.Fernandez, M.M. Larrondo-Petrie, K.R.Nair and Y. Xu. Xu,“An object-oriented authorization model for multimedia/hypertext systems”, Rept. TR-CSE-96–16. Dept. of CSE, Florida Atlantic University, April, 1996.Google Scholar
  11. B.Furht, “Multimedia Systems: An overview”, IEEE Multimedia, vol. l. no.1, spring 1994, 47–59.CrossRefGoogle Scholar
  12. J.Kahan-Oblatt, “A distributed authorization model for WWW”. Proc. LNET ’95 http://inet.nttam.com.Google Scholar
  13. W.Klas, E.J.Neuhold, and M.Schefl, “Using an object-oriented approach to model multimedia data”, Computer Communications, vol. 13, no. 4, 1990, 204–216.CrossRefGoogle Scholar
  14. H.Maurer et al., “Object-oriented modeling of hyperstructure: overcoming the static link defiency”. Info. and Soft. Technology, vol. 36, no. 6, 1994, 315–322.CrossRefGoogle Scholar
  15. D.Merkl and G.Pernul, “Security for next generation hypertext systems” Hypermedia, vol. 6, 1994.Google Scholar
  16. J.K.Millen, “Models of multilevel computer security”, in Advances in. Computers M.C.Yovits (Ed.), vol. 29, Academic Press, 1989.Google Scholar
  17. M.S.Olivier, “A heuristic for securing hypertext systems”, in Communications and Multimedia Security, R.Posch(Ed.), Chapman and Hall, 1995, 43–54.CrossRefGoogle Scholar
  18. R. P. van de Riet, A.Junk and E.Gudes, “Security in Cyberspace: a knowledge based approach” ,to be published.Google Scholar
  19. J.Rumbaugh, M.Blaha, W. R.Premerlani, F.Eddy, and W.Lorensen, Object-Oriented Modeling and Design, Prentice-Hall, 1991.Google Scholar
  20. R.Sandhu,E.Coyne, H.Feinstein,C.Youman, “Role-Based Access Control models”, IEEE Computer, vol. 29,no. 2, Feb. 1996, 38–47.CrossRefGoogle Scholar
  21. P.D.Stotts and R.Furuta, “Access control and verification in Petri-Net-based hyperdocuments”, Proc. COMPASS’89 49–55. (Web 1, 1996)http://www.memo.net/form2.htmlGoogle Scholar
  22. D.Woelk, W.Kim,and W.Luther,“An object-oriented approach to multimedia databases”. Proc. ACM SIGMOD Int. Conf. on Management of Data, 1986, 317–325.Google Scholar
  23. C.Wood and E.B.Fernandez, “Authorization in a decentralized database system”, Proc..5th Int. Conf. on. Very Large Databases, 1979, 352–359.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • Eduardo B. Fernandez
    • 1
  • Krishnakumar R. Nair
    • 1
  • Maria M. Larrondo-Petrie
    • 1
  • Yan Xu
    • 1
  1. 1.Department of Computer Science and EngineeringFlorida Atlantic UniversityBoca RatonUSA

Personalised recommendations