Presentation is loading. Please wait.

Presentation is loading. Please wait.

Outline of Security Introduction Types of constraints Example Challenge Framework Methodology MMCTPN SMIL 2.0 implementation Contribution Future Work.

Similar presentations


Presentation on theme: "Outline of Security Introduction Types of constraints Example Challenge Framework Methodology MMCTPN SMIL 2.0 implementation Contribution Future Work."— Presentation transcript:

1 Outline of Security Introduction Types of constraints Example Challenge Framework Methodology MMCTPN SMIL 2.0 implementation Contribution Future Work

2 Introduction Universal Access –Need to facilitate access to desired data of multimedia, composite objects according to the various user’s: Capabilities and Characteristics Composite multimedia Object (CMO) –Comprised of different media component such as structured data, semi structured text, image, video, audio, shape files, databases and a variety of relation ships among these components. These relationships represent different types of constraints, that must be adhered to when rendering it. Any MM Information Over Any Network To Any One with varying expertise, capabilities, and preferences To Any Device

3 Types of Constraints Synchronization constraints –Image A appear before Text B –Video Z plays in during audio Y is playing Spatial Constraints –Image A is to the right of Text T –Video Z is Above image X Modality Constraints –Types of players needed to render a multimedia component Fidelity Constraints –Image A must be displayed at a resolution of at least 640*480 Security Constraints –Researchers may not view videos of a patient interview.

4 Example The CMO object is describing a Lung Transplant. It consists of a recorded video of patient interview, text describing the symptoms, high-resolution X- ray images indicating the problem areas, restricted- access image of lung autopsy of past deceased patient, a recorded surgery proceeding of the patient, and surgery transcript.

5 Example X-ray images can only be played in a high-resolution display. Public and researchers may view the patient symptom description, only authorized insurance agent and doctors are permitted to view the patient recorded interview. The recorded surgery proceeding should not be viewed by youngsters. Access to certain components may require certain subscription.

6 Challenge Automatic manifestation of the object based on user capabilities and characteristics. Ensure consistent specification of the object, namely the different components and the various constraints among those components.

7 Framework The top layer comprises of the formal specification of the multimedia object The Petri net layer serve as conceptual tool for automatic manifestation of the multimedia objects based on credentials and capabilities,while ensuring the security,synchronization and fidelity constraints. The SMIL layer is for implementation purpose

8 Methodology The server comprises of an object manager that handles the requests from the clients. It may also provide tools to author multimedia objects. We represent the security, synchronization,fidelity and spatial constraints along with the playback duration of each component in the object plan. Oblet A small piece of software installed on the client side, to support objects with ability to decide on their own renderings (manifestations) The object manifestation is comprised of object plan modification,object delivery and object rendition. Minimize the responsibilities of the server in order to avoid congestion and overloading at the server.

9 MMCTPN Model for a CMO plan Petri Net based model –To model a multimedia object plan –Called MMCTPN Petri Net –Is well suited to represent synchronization and security constraints of the multimedia object. –Provides visualization as well as enactment –Lends itself to easily modeling constraints representing policies, user profiles, and preferences –Allows optimization

10 MMCTPN Model for a CMO plan (Con’t) MMCTPN (Multimedia color-time Petri-Net) consists of –Color-time Petri-Net –Color sets that represent: Types of Fidelity (e.g.,the resolution of the MM component) –Absence of fidelity capabilities is represented as Holes Types of credentials (e.g., credentials for researchers) –Absence of credentials of the subject requesting the object is represented as Holes Types of Modality (e.g., image, video,text, audio) –Absence of modality capabilities is represented as Holes –Playback duration The length of time the multimedia component is played. –Null place in each subMMCTPN (A part of the net between two subsequent transitions)

11 Sample Plan Credentials and capabilities are represented as tokens and absence of them are represented as holes.The initial place is marked with these to start with. For example,in the figure shown, this subject is not an employee of the insurance company, and therefore the initial marking contains hole of color (ta).

12 Modified plan To insert here

13 SMIL 2.0 Implementation We are presenting Petri Net model that presents different types of constraints in the multimedia object.We translate all of them into SMIL when implementing the Petri net model. We show how the synchronization constraints can be implemented in SMIL.

14 Original Plan In the described multimedia object, researcher is not allowed to access the patient video interview because it might reveal the patient identity.

15 Pruned Plan After parsing the document against the security constraint,the output file that will be viewed by the researcher does not include the patient interview. we have adopted the security model and the language (XACL) in specifying the security constraints on the multimedia object. We have used the XACL visual tool,tool from IBM XML Security Suite

16 Contributions To insert

17 Future Wok To insert


Download ppt "Outline of Security Introduction Types of constraints Example Challenge Framework Methodology MMCTPN SMIL 2.0 implementation Contribution Future Work."

Similar presentations


Ads by Google