A multimedia access control language for virtual and ambient intelligence environments

Access control models are becoming increasingly important in several application domains especially in distributed environments like those addressed by Web Services. Established approaches such as DAC [16] , MAC [16] RBAC [11, 12, 22] and others [6, 5, 15, 1] suggest representing users in different ways (labels, roles, credentials, etc.) in order to facilitate the association of authorization and access control policies. In intelligent and virtual ambient applications, users exist in a controlled environment equipped with multimedia sensors such as cameras and microphones, and use their terminals in several application environments. In this paper, we study the problem of integrating multimedia objects into access control models and particularly role-based ones. Here, we describe a Multimedia Access Control Language (M 2ACL) in which users and roles are described by using sets of mul- timedia objects,greatly increasing the flexibility of access control policies and their applicability to virtual and ambient intelligence (AmI environments.We address potential risks related to the use of multimedia objects by defining the concept of filter functions used to aggregate a set of values into a relevant one.Finally,we present a set of functional specification and the experiments conducted to validate the proposed approach.

[1]  Charles A. Shoniregun,et al.  Securing XML Documents , 2004, Australas. J. Inf. Syst..

[2]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[3]  Surya Nepal,et al.  Query processing issues in image (multimedia) databases , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).

[4]  Divyakant Agrawal,et al.  Approximate nearest neighbor searching in multimedia databases , 2001, Proceedings 17th International Conference on Data Engineering.

[5]  Richard Chbeir,et al.  Towards Fully Functional Distributed MultiMedia DBMS , 2004, J. Digit. Inf. Manag..

[6]  Sabrina De Capitani di Vimercati,et al.  Access Control of SVG Documents , 2002, DBSec.

[7]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[8]  Elisa Bertino,et al.  Access-control language for multidomain environments , 2004, IEEE Internet Computing.

[9]  Richard Chbeir,et al.  MCA2CM: Multimedia Context-Aware Access Control Model , 2007, 2007 IEEE Intelligence and Security Informatics.

[10]  J. Miteran,et al.  Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine , 2006, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics.

[11]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[12]  Arthur P. Dempster,et al.  A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[13]  David Poole,et al.  Logic, Knowledge Representation, and Bayesian Decision Theory , 2000, Computational Logic.

[14]  Elisa Bertino,et al.  A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..

[15]  Sylvia L. Osborn,et al.  A role-based approach to access control for XML databases , 2004, SACMAT '04.

[16]  Ernesto Damiani,et al.  Towards Privacy-Enhanced Authorization Policies and Languages , 2005, DBSec.

[17]  D. Richard Kuhn,et al.  A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.