Protecting Notification of Events in Multimedia Systems

Jaime Delgado

2006

Abstract

Protection of multimedia information is an important issue for current actors in the multimedia distribution value chain. Security techniques exist for protecting the multimedia contents itself, like encryption, watermarking, fingerprinting and so on. Nevertheless, at a higher level, other mechanisms could be used for the protection and management of multimedia information. One of these mechanisms is the notification of events of actions, done by the different actors of the multimedia value chain (from content creator to final user), for the different delivery channels. It is possible to describe event notifications by standard means by using MPEG-21 event reporting. However, the current standard initiative does not take into account the security of the events being notified. In this paper we present a possible solution to this problem by combining two different parts of the MPEG-21 standard, Event Reporting (ER) and Intellectual Property Management and Protection (IPMP).

References

  1. Alexander, C., Ishikawa, S., and Silverstein, M., A pattern language: towns, builings, construction. 1977, New York: Oxford University Press.
  2. Babar, M.A., Wang, X., and Gorton, I. Supporting Security Sensitive Architecture Design. in QoSA-SOQUA 2005. 2005: Springer-Verlag.
  3. Barbacci, M.R., Ellison, R., Lattanze, A.J., Stafford, J.A., Weinstock, C.B., and Wood, W.G., Quality Attribute Workshops (QWAs). Third Edition., in Architecture Tradeoff Analysis Initiative. 2003, Carnegie Mellon. Software Engineering Institute. p. 36
  4. Bass, L., Clements, P., and Kazman, R., eds. Software Architecture in Practice. 2nd ed. 2003, Addison-Wesley.
  5. Berry, C.A., Carnell, J., Juric, M.B., Kunnumpurath, M.M., Nashi, N., and Romanosky, S., Chapter 5: Patterns Applied to Manage Security, in J2EE Design Patterns Applied.
  6. Blakley, B., Heath, C., and TheOpenGroup, Technical Guide. Security Design Patterns. 2004. http://www.opengroup.org/
  7. Braga, A.M., Rubira, C., and Dahab, R. Tropyc: A Pattern Language for Cryptographic Software. in 5th Pattern Languages of Programming (PLoP'98) Conference. 1998. Allerton Park, Illinouis, USA.
  8. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M., Pattern-Oriented Software Architecture: A System of Patterns. 1st ed. 1996: John Wiley & Sons. 476 Pg.
  9. CERT. http://www.cert.org/stats/cert_stats.html#incidents
  10. Das Neves, F. and Garrido, A., BodyGuard, in Pattern Languages of Programs III, Addison-Wesley, Editor. 1998.
  11. Delessy-Gassant, N., Fernandez, E.B., Rajput, S., and Larrondo-Petrie, M.M. Patterns for Application Firewalls. in 11th Conference on Pattern Languages of Programs (PLoP'2004). 2004. Allterton Park, Monticello, Illinois.
  12. F. Lee Brown, J., DiVietri, J., Diaz de Villegas, G., and Fernandez, E.B. The Authenticator Pattern. in 6th Conference on Pattern Languages of Programs, PLoP 1999. 1999. Allterton Park, Monticello, Illinois.
  13. Fernandez, E.B. Patterns for Operating Systems Access Control. in 9th Conference on Pattern Languages of Programs, PLoP 2002. 2002. Allerton Park, Illinois, USA.
  14. Fernandez, E.B. and Pan, R. A pattern language for security models. in 8th Conference on Pattern Languages of Programs, PLoP 2001. 2001. Allerton Park, Illinois, USA.
  15. Fernandez, E.B., Petrie, M.L., Seliya, N., and Herzberg, A. A Pattern Language for Firewalls. in 10th Conference on Pattern Languages of Programs (PLoP'2003). 2003. Allterton Park, Monticello, Illinois.
  16. Firesmith, D.G., Commom Concepts Underlying Safety, Security, and Survivability Engineering. 2003, SEI
  17. Firesmith, D.G., Specifying Reusable Security Requirements. Journal of Object Technology, 2004. 3: p. 61-75.
  18. Flanders, R. and Fernandez, E.B. Data Filter Architecture Pattern. in 6th Conference on Pattern Languages of Programs, PLoP 1999. 1999. Allterton Park, Monticello, Illinois.
  19. Gamma, E., Helm, R., Johnson, R., and Vlissides, J., Design Patterns: Elements of Reusable Object-Oriented Software. 1994: Addison-Wesley.
  20. IDC. 2005. http://www.idc.com/getdoc.jsp?containerId=prUS00190705
  21. Kienzle, D.M. and Elder, M.C., Final Technical Report: Security Patterns for web Application Development. 2005
  22. King, C., Osmanoglu, E., and Dalton, C., Security Architecture. 2001: McGraw-Hill.
  23. Kis, M. Information Security Antipatterns in Software Requirements Engineering. in 9th Conference on Pattern Languages of Programs (PLoP'2002). 2002. Allterton Park, Monticello, Illinois.
  24. Ramachandran, J., Designing Security Architecture Solutions. 2002: John Wiley & Sons.
  25. Romanosky, S. Enterprise Security Patterns. in 7th European Conference on Pattern Languages of Programs (EuroPlop'02). 2002. Irsee, Germany.
  26. Romanosky, S., Security Design Patterns. 2001. http://www.cgisecurity.com/lib/securityDesignPatterns.html
  27. Schumacher, M. and Roedig, U. Security Engineering with Patterns. in 8th Conference on Patterns Lnaguages of Programs, PLoP 2001. 2001. Monticello, Illinois, USA.
  28. Steel, C., Nagappan, R., and Lai, R., Core Security Patterns. 2005: Prentice Hall PTR. 1088 Pg.
  29. Wassermann, R., Using Security Patterns to Model and Analyze Security Requirements. 2004. p. 151
  30. Yoder, J. and Barcalow, J. Architectural Patterns for Enabling Application Security. in 4th Conference on Patterns Language of Programming, PLop 1997. 1997. Monticello, Illinois, USA.
Download


Paper Citation


in Harvard Style

Delgado J. (2006). Protecting Notification of Events in Multimedia Systems . In Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006) ISBN 978-972-8865-52-8, pages 163-173. DOI: 10.5220/0002483801630173


in Bibtex Style

@conference{wosis06,
author={Jaime Delgado},
title={Protecting Notification of Events in Multimedia Systems},
booktitle={Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006)},
year={2006},
pages={163-173},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002483801630173},
isbn={978-972-8865-52-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006)
TI - Protecting Notification of Events in Multimedia Systems
SN - 978-972-8865-52-8
AU - Delgado J.
PY - 2006
SP - 163
EP - 173
DO - 10.5220/0002483801630173