Advertisement

Security-Relevant Challenges of Selected Systems for Multi-user Interaction

  • Marcus Nitsche
  • Jana Dittmann
  • Andreas Nürnberger
  • Claus Vielhauer
  • Robert Buchholz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6535)

Abstract

One important goal in the field of multi-user interaction is to support collaborative work of several users as ergonomic as possible. Unfortunately, security-relevant aspects were neglected in the past. Therefore, we study in this contribution the risks and challenges for security of such collaborative working environments on the basis of five selected pen and gesture-based input techniques. We show that the underlying technologies (Anoto pens, Wii Remotes, DiamondTouch, FTIR Table tops, Microsoft Surface) do have deficits, in particular regarding the insurance of user authenticity and data integrity, and that collaborative working brings new challenges for formal security models. We discuss some of the major challenges on situation and context recognition for dynamic role assignment based on a scenario from the field of energy engineering and point out that several of the underlying problems are of special importance for the development of reliable collaborative multimedia applications for object organization and exchange.

Keywords

Input Device Authorized Person Select System Context Recognition Frustrate Total Internal Reflection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rogner, H., Langlois, L.M., McDonald, A., Weisser, D., Howells, M.: The Costs of Energy Supply Security. In: 20th World Energy Congress, Rome, Italy (November 2007)Google Scholar
  2. 2.
    Szymanski, R., Goldin, M., Palmer, N., Beckinger, R., Gilday, J., Chase, T.: Command And Control in a Multitouch Environment. In: 26th Army Science Conference Proceedings, Orlando, Florida (2008)Google Scholar
  3. 3.
    Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Multimedia and Security – Using Cryptographic and Watermarking Algorithms. IEEE MultiMedia 8(4), 54–65 (2001)Google Scholar
  4. 4.
    Technology-Website of Anoto AB, http://www.anoto.com/digital-pen-paper.aspx
  5. 5.
    Scheidat, T., Vielhauer, C., Dittmann, J.: Handwriting verification - comparison of a multi-algorithmic and a multi-semantic approach. In: Image and Vision Computing, Bd. 27, March 2009, pp. 269–278. Elsevier, Amsterdam (2009)Google Scholar
  6. 6.
    Scheidat, T., Vielhauer, C., Dittmann, J.: Advanced studies on reproducibility of biometric hashes. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds.) BIOID 2008. LNCS, vol. 5372, pp. 150–159. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  7. 7.
    Low-Cost Multi-point Interactive Whiteboards Using the Wii Remote, http://johnnylee.net/projects/wii/
  8. 8.
    Schlömer, T., Poppinga, B., Henze, N., Boll, S.: Gesture recognition with a Wii controller. In: Proceedings of the 2nd International Conference on Tangible and Embedded Interaction, New York, pp. 11–14 (2008)Google Scholar
  9. 9.
  10. 10.
    Dietz, P., Leigh, D.: DiamondTouch: A Multi-User Touch Technology. In: Proceedings of the 14th annual ACM Symposium on User Interface Software and Technology, Orlando, Florida, pp. 219–226 (2001)Google Scholar
  11. 11.
    Han, J.Y.: Low-Cost Multi-Touch Sensing through Frustrated Total Internal Reflection. In: Proceedings of the 18th Annual ACM Symposium on User Interface Software and Technology, Seattle, Washington, pp. 115–118 (2005)Google Scholar
  12. 12.
    Microsoft Surface Product website, http://www.microsoft.com/SURFACE/

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Marcus Nitsche
    • 1
    • 3
  • Jana Dittmann
    • 2
    • 3
  • Andreas Nürnberger
    • 1
    • 3
  • Claus Vielhauer
    • 2
    • 3
  • Robert Buchholz
    • 2
    • 3
  1. 1.Data and Knowledge Engineering GroupOtto-von-Guericke-University MagdeburgMagdeburgGermany
  2. 2.Research Group Multimedia and SecurityOtto-von-Guericke-University MagdeburgMagdeburgGermany
  3. 3.Faculty of Computer ScienceOtto-von-Guericke-University MagdeburgMagdeburgGermany

Personalised recommendations