Abstract
Nowadays in the world of networked applications, most applications rely on the client/server model. In this context, the client-side application connects to a server to access a specific type of content or data. Nevertheless this kind of application has an important drawback: they are rigid in the sense that they are specific-purpose oriented.
In order to overcome this drawback, a new approach is proposed in this paper. This consists of having an environment on top of which any kind of application, but specially multimedia ones, can be dynamically plugged-in and run. In fact this environment will provide the means to negotiate for new ‘applications’ and download them ‘as-you-need’. This capability leads to a dynamic way of software distribution and upgrading transparent to the user.
In this paper we present the design and some implementation issues of what we call ‘Multimedia Client/Server Environment’, which is a client/server application that will provide a secure environment on top of which multimedia services and applications can be dynamically and transparently plugged-in. In fact, this environment will handle all aspects related to software negotiation and downloading. Even more, it will also provide the means to define different levels of security which can be adjusted on the basis of application environmental conditions.
Preview
Unable to display preview. Download preview PDF.
References
“The Java Language Specification 1.0∝, Sun Microsystems, Inc., 1995.
“The Java Virtual Machine Specification∝, Internet document, Sun Microsystems, Inc., 1995.
“The HotJava(tm) Browser∝, Internet document, Sun Microsystems, Inc., 1995.
D.R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
B. Schneier, Applied Cryptography, John Wiley & Sons, Inc., 1993.
D. Coppersmith, “The Data Encryption Standard and its Strength Against Attacks∝, IBM J. Research and Development, Vol. 38, No. 3, 1994.
G.J. Simmons, “Symmetric and Asymmetric Encryption∝, ACM Computing Surveys, vol. 11, No. 4, 1979.
R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems∝, Comm. ACM, Vol. 21, No. 2, 1978.
W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography∝, Proc. IEEE, Vol. 67, No. 3, 1979.
S. Kent, “Internet Security Standards: Past, Present, and Future∝, StandardView, Vol. 2, No. 2, 1994.
J. Schiller, “Secure Distributed Computing∝, Scientific American, Nov. 1994.
“MPEG-4 Requirements∝, draft in progress of the MPEG-4 Requirements AdHocGroup, ISO/IEC JTC1/SC29/WG11 N1238, 1996.
“MSDL specification. Version 1.1∝, draft of the MPEG-4 System Description Language AdHocGroup, ISO/IEC JTC1/SC29/WG11 N1164, 1996.
P. V. Rangan and H. M. Vin and S. Ramanathan, “Designing an On-Demand Multimedia Service∝, IEEE Communications Magazine, vol. 30, n. 7, pp. 56–64, Jul 1992.
A. Hopper, “Pandora — an experimental system for multimedia applications∝, ACM Operating Systems Review, vol.24, n. 2, pp. 19–34, Apr 1990.
S. Ramanathan, P. V. Rangan, H. M. Vin and Thomas Kaeppner, “Optimal Communication Architectures for Multimedia Conferencing in Distributed Systems∝, In Proceedings of 12th International Conference on Distributed Computing Systems, Jun. 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ribés, J.M.M., Delmot, T., Macq, B. (1997). A fully configurable secure environment for multimedia applications. In: Fdida, S., Morganti, M. (eds) Multimedia Applications, Services and Techniques — ECMAST '97. ECMAST 1997. Lecture Notes in Computer Science, vol 1242. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0037368
Download citation
DOI: https://doi.org/10.1007/BFb0037368
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63078-4
Online ISBN: 978-3-540-69126-6
eBook Packages: Springer Book Archive