ATMAN: Trading of digital audio visual contents

  • Giovanni Caire
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1425)


This chapter describes the work undertaken by the ATMAN AC225 project that aims at creating a system using the information and telecommunication technologies to support professional users in the trading of audio visual contents in digital form. The ATMAN model is firstly presented, and the users, the data and the equipment involved in the system are defined outlining their roles and peculiarities. After that the main procedures and the security mechanisms supported by the system are described. Then the legal aspects that must be taken into account to exploit the system in a commercial environment are mentioned. Finally on one hand the advantages for the audio visual industry and, on the other hand, the main drawbacks to the deployment of the described system are listed.


Content Provider Intellectual Property Right Content Description Content Server Commercial Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    MPEG-2 (ISO/IEC 13818), Generic Coding of Moving Pictures and Associated Audio, 1995.Google Scholar
  2. 2.
    ISAN, International Standard for Audiovisual NumberGoogle Scholar
  3. 3.
    Parnall S., Standen B., Caire G., Re M., ATMAN Deliverable DE006 “Content Description Specifications” 1997Google Scholar
  4. 4.
    DAVIC (Digital Audio Visual Council) 1.0 Specifications, September 1995Google Scholar
  5. 5.
    MHEG5 (ISO/IEC 13522), Coding of multimedia and hypermedia information, 1996Google Scholar
  6. 6.
    MPEG2 Part 6: DSMCC (ISO/IEC 13818-6), Digital Storage Medium Command and Control, 1996Google Scholar
  7. 7.
    ISO/IEC 9594-8, ITU-T Recommendation X.509, Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, 1994Google Scholar
  8. 8.
    DAVIC 1.2 Specification Part 10, Basic Security Tools for DAVIC 1.0, 1997Google Scholar
  9. 9.
    Schneier B., Applied Cryptography, 11 ed., USA, John Wiley & Sons Inc., 1996Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Giovanni Caire
    • 1
  1. 1.CSELT Centro Studi e Laboratori Telecomunicazioni S.p.ATorinoItaly

Personalised recommendations