Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control – Computational Evaluation

  • Adam Wójtowicz
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 299)


In this paper computational complexity of an approach called Selective Semantic Modeling (SSM) is evaluated. The algorithm of the SSM allows for user privileges “mining” from dynamically composed scripted 3D scenes with respect to semantics of inter-object interactions. The SSM method is based on the concept of semantic operations, which are generated at run-time from the scripted content and are used to construct user privileges.


call graph mining dynamic content composition user privileges 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Eno, J., Gauch, S., Thompson, C.: Searching for the metaverse. In: Proc. of the 16th ACM Symp. on Virtual Reality Software and Technology, pp. 223–226. ACM, New York (2009)CrossRefGoogle Scholar
  2. 2.
    Botev, J., Hohfeld, A., Schloss, H., Scholtes, I., Sturm, P., Esch, M.: The HyperVerse: concepts for a federated and Torrent-based ’3D Web’. Int. J. Adv. Media Commun. 2(4), 331–350 (2008)CrossRefGoogle Scholar
  3. 3.
    Flotyński, J., Dalkowski, J., Walczak, K.: Building multi-platform 3D virtual museum ex-hibitions with Flex-VR. In: The 18th International Conference on Virtual Systems and Multimedia, pp. 391–398. IEEE Advancing Technology for Humanity, Milan (2012)CrossRefGoogle Scholar
  4. 4.
    Horn, D., Cheslack-Postava, E., Azim, T., Freedman, M.J., Levis, P.: Scaling Virtual Worlds with a Physical Metaphor. IEEE Pervasive Computing 8(3), 50–54 (2009)CrossRefGoogle Scholar
  5. 5.
    Alpcan, T., Bauckhage, C., Kotsovinos, E.: Towards 3D Internet: Why, What, and How? In: Proc. of the 2007 Int. Conf. on Cyberworlds, pp. 95–99. IEEE, Washington, DC (2007)CrossRefGoogle Scholar
  6. 6.
    Lian, S., Kannelopoulos, D., Ruffo, G.: Recent Advances in Multimedia Information System Security. Informatica 33(1), 3–24 (2009)MathSciNetGoogle Scholar
  7. 7.
    Wójtowicz, A.: Secure User-Contributed 3D Virtual Environments. In: Interactive 3D Multimedia Content – Models for Creation, Management, Search and Presentation, pp. 171–193. Springer, London (2012)CrossRefGoogle Scholar
  8. 8.
    Wójtowicz, A., Cellary, W.: Representing User Privileges in Object-Oriented Virtual Reality Systems. In: Camarinha-Matos, L.M., Pereira, P., Ribeiro, L. (eds.) DoCEIS 2010. IFIP AICT, vol. 314, pp. 52–61. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  9. 9.
    Wójtowicz, A., Cellary, W.: Access Control Model for Dynamic VR Applications. In: Rea, A. (ed.) Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management, pp. 284–305. IGI Global (2011)Google Scholar
  10. 10.
    Zhang, X., Gracanin, D.: Service-Oriented-Architecture based Framework for Multi-User Virtual Environments. In: Proceedings of the 40th Conference on Winter Simulation, Miami, USA, pp. 1139–1147 (2008)Google Scholar
  11. 11.
    Repplinger, M., Löffler, A., Schug, B., Slusallek, P.: Extending X3D for distributed multimedia processing and control. In: Proc. of the 14th Int. Conf. on 3D Web Techn., Darmstadt, pp. 61–69. ACM, New York (2009)Google Scholar
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.
    Open Wonderland,
  17. 17.
  18. 18.
  19. 19.
    IEEE Standard for Distributed Interactive Simulation—Application Protocols,
  20. 20.
    IEEE Standard for Modelling and Simulation (M&S) High Level Architecture (HLA),
  21. 21.
    Zeng, W., Yu, H., Lin, C.: Multimedia Security Technologies for Digital Rights Management. Academic Press, Inc., Orlando (2006)Google Scholar
  22. 22.
    Wang, X., Demartini, T., Wragg, B., Paramasivam, M., Barlas, C.: The mpeg-21 rights expression language and rights data dictionary. IEEE Transactions on Multimedia 7(3), 408–417 (2005)CrossRefGoogle Scholar
  23. 23.
    Herrero, A., Zurutuza, U., Corchado, E.: A neural-visualization ids for honeynet data. International Journal of Neural Systems 22(2)Google Scholar
  24. 24.
    Herrero, A., Navarro, M., Corchado, E., Julián, V.: RT-MOVICAB-IDS: Addressing real-timeintrusion detection. Future Generation Comp. Syst. 29(1), 250–261 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Information TechnologyPoznań University of EconomicsPoznańPoland

Personalised recommendations