Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC)
…
1 page
1 file
ABSTRACT Controlling, protecting and managing access to multimedia content could be a difficult task if a system was not prepared for it. To solve this situation minimizing the impact on the existing system, we propose the use of a modular architecture which provides digital rights and privacy policies management features. It can be integrated just invoking some web service calls, depending on which services are needed. To show its use, we present several scenarios where we have successfully integrated it, like distribution of content for digital terrestrial television broadcasting and access to personal health information.
The 2005 International Symposium on Web …, 2005
Trustworthy Internet, 2011
There are several initiatives working in the definition and implementation of distributed architectures that enable the development of distributed multimedia applications on top of them, while offering Digital Rights Management (DRM) features. In the paper, the main features of MPEG Extensible Middleware (MXM) [1], the Advanced IPTV terminal (AIT) [2] and DMAG [3] Multimedia Information Protection and Management System (MIPAMS) [4] are presented, while highlighting the common ground and differences between MIPAMS and the standards. A set of usage scenarios is proposed to show how MIPAMS enables the development of applications on top of it, which deal with the needs of content creators, distributors and consumers according to different business models.
Proceedings of the IEEE, 2000
Information Security Policies and Actions in Modern Integrated Systems
Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of This chapter appears in the book, Information Security Policies and Actions in Modern Integrated Systems, edited by Mariagrazia Fugini and Carlo Bellettini.
Proceedings of the IADIS …, 2006
2006
High level security is a key requirement in hypermedia/web applications. The systems opening to the Internet makes the research effort to move towards protecting the information transmission (i.e. SOAP messages, policy descriptions.. .), but little attention is paid to what the user can do with the system. Role-based access control (RBAC) allows to formulate the organization's resource access policy in a natural way, so a role-based access model for hypermedia will make it easier to integrate the security design with the rest of the system design. In service oriented architectures, an access policy service would allow to gather the management and deployment of the security policy in distributed and heterogeneous environments. This paper describes a role-based access control model for hypermedia called MARAH, and its implementation as a web service. An use case of the model in the design of the ARCE application is also discussed.
Computer Law & Security Review, 2004
This paper aims at linking researches in copyright law and in multimedia. It presents the core legal issues in the field of content protection and proposes a renewed approach to copyright enforcement. Stating the necessity of tackling the exemptions to copyright from a technical-based approach, it introduces the notion of Digital Rights and Exemptions Management Systems. The authors emphasize the need for moving into such DREMS protection schemes and examine the possibility to implement the "balance of interests" within the protection devices.
IEEE Multimedia, 2011
The wide range of media and consumer devices, currently available, has raised new security requirements for multimedia systems and their applications. Despite the wide variety of work conducted on the access control, Digital Rights Management (DRM) and adaptation areas to date, there is a lack of initiatives addressing them together. This article analyzes existing initiatives and proposes new technologies for the governed adaptations of secured content in heterogeneous environments. These technologies are integrated in an architecture for the secure management of multimedia contents, which covers the complete digital content value chain, from creation to consumption by end users. Video Surveillance is the application scenario chosen for further illustrating the use of the proposed architecture. Two use cases are discussed in order to address governance, protection and adaptation requirements in surveillance applications.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Reconozco la canción. Tramas musicales en los cines posclásicos de América Latina y Europa, 2024
RumeliDE Dil ve Edebiyat Araştırmaları Dergisi, 2018
Techniques Sciences Méthodes
Journal of Physics: Conference Series, 2006
International Journal of Systematic Theology, 2010
Revista Brasileira de Epidemiologia, 2010
Frontiers in Immunology
Proc. of the Envisat Symposium- …, 2007
Sustainability
JLA (Jurnal Lingua Applicata)
The Astrophysical Journal, 2002
Optical and Quantum Electronics, 2020
TURKISH JOURNAL OF CHEMISTRY, 2020
Journal of Environmental Chemical Engineering, 2014
Acta Metallurgica Slovaca, 2017