A fully configurable secure environment for multimedia applications
Nowadays in the world of networked applications, most applications rely on the client/server model. In this context, the client-side application connects to a server to access a specific type of content or data. Nevertheless this kind of application has an important drawback: they are rigid in the sense that they are specific-purpose oriented.
In order to overcome this drawback, a new approach is proposed in this paper. This consists of having an environment on top of which any kind of application, but specially multimedia ones, can be dynamically plugged-in and run. In fact this environment will provide the means to negotiate for new ‘applications’ and download them ‘as-you-need’. This capability leads to a dynamic way of software distribution and upgrading transparent to the user.
In this paper we present the design and some implementation issues of what we call ‘Multimedia Client/Server Environment’, which is a client/server application that will provide a secure environment on top of which multimedia services and applications can be dynamically and transparently plugged-in. In fact, this environment will handle all aspects related to software negotiation and downloading. Even more, it will also provide the means to define different levels of security which can be adjusted on the basis of application environmental conditions.
Unable to display preview. Download preview PDF.
- [JLS95]“The Java Language Specification 1.0∝, Sun Microsystems, Inc., 1995.Google Scholar
- [JVM95]“The Java Virtual Machine Specification∝, Internet document, Sun Microsystems, Inc., 1995.Google Scholar
- [HJA95]“The HotJava(tm) Browser∝, Internet document, Sun Microsystems, Inc., 1995.Google Scholar
- [STI95]D.R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.Google Scholar
- [SCN93]B. Schneier, Applied Cryptography, John Wiley & Sons, Inc., 1993.Google Scholar
- [COP94]D. Coppersmith, “The Data Encryption Standard and its Strength Against Attacks∝, IBM J. Research and Development, Vol. 38, No. 3, 1994.Google Scholar
- [SIM79]G.J. Simmons, “Symmetric and Asymmetric Encryption∝, ACM Computing Surveys, vol. 11, No. 4, 1979.Google Scholar
- [RSA78]R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems∝, Comm. ACM, Vol. 21, No. 2, 1978.Google Scholar
- [DH79]W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography∝, Proc. IEEE, Vol. 67, No. 3, 1979.Google Scholar
- [KEN94]S. Kent, “Internet Security Standards: Past, Present, and Future∝, StandardView, Vol. 2, No. 2, 1994.Google Scholar
- [SCI94]J. Schiller, “Secure Distributed Computing∝, Scientific American, Nov. 1994.Google Scholar
- [MPG96]“MPEG-4 Requirements∝, draft in progress of the MPEG-4 Requirements AdHocGroup, ISO/IEC JTC1/SC29/WG11 N1238, 1996.Google Scholar
- [MSD96]“MSDL specification. Version 1.1∝, draft of the MPEG-4 System Description Language AdHocGroup, ISO/IEC JTC1/SC29/WG11 N1164, 1996.Google Scholar
- [RVR92]P. V. Rangan and H. M. Vin and S. Ramanathan, “Designing an On-Demand Multimedia Service∝, IEEE Communications Magazine, vol. 30, n. 7, pp. 56–64, Jul 1992.Google Scholar
- [HOP90]A. Hopper, “Pandora — an experimental system for multimedia applications∝, ACM Operating Systems Review, vol.24, n. 2, pp. 19–34, Apr 1990.Google Scholar
- [RRK92]S. Ramanathan, P. V. Rangan, H. M. Vin and Thomas Kaeppner, “Optimal Communication Architectures for Multimedia Conferencing in Distributed Systems∝, In Proceedings of 12th International Conference on Distributed Computing Systems, Jun. 1992.Google Scholar