Skip to main content

A fully configurable secure environment for multimedia applications

  • Multimedia Services
  • Conference paper
  • First Online:
Multimedia Applications, Services and Techniques — ECMAST '97 (ECMAST 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1242))

Abstract

Nowadays in the world of networked applications, most applications rely on the client/server model. In this context, the client-side application connects to a server to access a specific type of content or data. Nevertheless this kind of application has an important drawback: they are rigid in the sense that they are specific-purpose oriented.

In order to overcome this drawback, a new approach is proposed in this paper. This consists of having an environment on top of which any kind of application, but specially multimedia ones, can be dynamically plugged-in and run. In fact this environment will provide the means to negotiate for new ‘applications’ and download them ‘as-you-need’. This capability leads to a dynamic way of software distribution and upgrading transparent to the user.

In this paper we present the design and some implementation issues of what we call ‘Multimedia Client/Server Environment’, which is a client/server application that will provide a secure environment on top of which multimedia services and applications can be dynamically and transparently plugged-in. In fact, this environment will handle all aspects related to software negotiation and downloading. Even more, it will also provide the means to define different levels of security which can be adjusted on the basis of application environmental conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “The Java Language Specification 1.0∝, Sun Microsystems, Inc., 1995.

    Google Scholar 

  2. “The Java Virtual Machine Specification∝, Internet document, Sun Microsystems, Inc., 1995.

    Google Scholar 

  3. “The HotJava(tm) Browser∝, Internet document, Sun Microsystems, Inc., 1995.

    Google Scholar 

  4. D.R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.

    Google Scholar 

  5. B. Schneier, Applied Cryptography, John Wiley & Sons, Inc., 1993.

    Google Scholar 

  6. D. Coppersmith, “The Data Encryption Standard and its Strength Against Attacks∝, IBM J. Research and Development, Vol. 38, No. 3, 1994.

    Google Scholar 

  7. G.J. Simmons, “Symmetric and Asymmetric Encryption∝, ACM Computing Surveys, vol. 11, No. 4, 1979.

    Google Scholar 

  8. R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems∝, Comm. ACM, Vol. 21, No. 2, 1978.

    Google Scholar 

  9. W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography∝, Proc. IEEE, Vol. 67, No. 3, 1979.

    Google Scholar 

  10. S. Kent, “Internet Security Standards: Past, Present, and Future∝, StandardView, Vol. 2, No. 2, 1994.

    Google Scholar 

  11. J. Schiller, “Secure Distributed Computing∝, Scientific American, Nov. 1994.

    Google Scholar 

  12. “MPEG-4 Requirements∝, draft in progress of the MPEG-4 Requirements AdHocGroup, ISO/IEC JTC1/SC29/WG11 N1238, 1996.

    Google Scholar 

  13. “MSDL specification. Version 1.1∝, draft of the MPEG-4 System Description Language AdHocGroup, ISO/IEC JTC1/SC29/WG11 N1164, 1996.

    Google Scholar 

  14. P. V. Rangan and H. M. Vin and S. Ramanathan, “Designing an On-Demand Multimedia Service∝, IEEE Communications Magazine, vol. 30, n. 7, pp. 56–64, Jul 1992.

    Google Scholar 

  15. A. Hopper, “Pandora — an experimental system for multimedia applications∝, ACM Operating Systems Review, vol.24, n. 2, pp. 19–34, Apr 1990.

    Google Scholar 

  16. S. Ramanathan, P. V. Rangan, H. M. Vin and Thomas Kaeppner, “Optimal Communication Architectures for Multimedia Conferencing in Distributed Systems∝, In Proceedings of 12th International Conference on Distributed Computing Systems, Jun. 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Serge Fdida Michele Morganti

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ribés, J.M.M., Delmot, T., Macq, B. (1997). A fully configurable secure environment for multimedia applications. In: Fdida, S., Morganti, M. (eds) Multimedia Applications, Services and Techniques — ECMAST '97. ECMAST 1997. Lecture Notes in Computer Science, vol 1242. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0037368

Download citation

  • DOI: https://doi.org/10.1007/BFb0037368

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63078-4

  • Online ISBN: 978-3-540-69126-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics