Abstract
This chapter deals with the problem of access control in 3D virtual environments which are interactive, behavior-rich, multi-user, and based on user-contributed content. Traditional coarse-grained and geometry-centric privilege modeling methods are not sufficient for such environments. New methods are required that concern not only geometrical models, their relationships and structure, but also inter-object behavioral interactions. In this chapter, a method called Selective Semantic Modeling (SSM) is described. The SSM method enables modeling of privileges for behavioral objects with respect to their semantics. The SSM method is based on the concept of semantic operations, which are generated at run-time from the current content structure of a virtual environment and are applicable to the access control model as a part of a privilege. Semantic consistency of the privilege is guaranteed by a two-phase regeneration and validation mechanism, so that user privileges can be expressed in a precise, semantically accurate and flexible way.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abelson, H., Adida, B., Linksvayer, M., Yergler, N.: ccREL: the creative commons rights expression language. Version 1.0. http://wiki.creativecommons.org/images/d/d6/Ccrel-1.0.pdf (2008). Accessed 4 May 2011
Active Worlds. http://www.activeworlds.com (2011). Accessed 4 May 2011
Bitmanagement BS Collaborate. http://www.bitmanagement.com/products/server/bs-collaborate (2011). Accessed 4 May 2011
Cera, D.D., Kim, T., Han, J., Regli, W.C.: Role-based viewing envelopes for information protection in collaborative modeling. Comput. Aided Des. 36(1), 873–886 (2004)
Craig, A., Sherman, W.R., Will, J.D.: Developing Virtual Reality Applications: Foundations of Effective Design. Morgan Kaufmann, San Mateo (2009)
ENISA: Virtual world, real money: security and privacy in massively-multiplayer online games and social and corporate virtual worlds. Position Paper of European Network and Information Security Agency. http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_security_privacy_virtualworlds.pdf (2008). Accessed 4 May 2011
Fang, C., Peng, W., Ye, X., Zhang, S.: Multi-level access control for collaborative CAD. In: Proceedings of the 9th International Conference on Computer Supported Cooperative Work in Design, vol. 1, pp. 643–648 (2005)
Gutierrez, M., Vexo, F., Thalmann, D.: Semantics-based representation of virtual environments. Int. J. Comput. Appl. Technol. 23, 229–238 (2005)
Gutierrez, M., Vexo, F., Thalmann, D.: Stepping into Virtual Reality. Springer, Berlin (2008)
Helmer, J.: Second life and virtual worlds. Learning light. http://www.norfolkelearningforum.co.uk/wp-content/uploads/2009/04/virtual-worlds_ll_oct_2007.pdf (2007). Accessed 4 May 2011
Horn, D., Cheslack-Postava, E., Azim, T., Freedman, M.J., Levis, P.: Scaling virtual worlds with a physical metaphor. IEEE Pervasive Comput. 8(3), 50–54 (2009)
Hypergrid security. In: Open Simulator Wiki. http://opensimulator.org/wiki/Hypergrid_Security (2011). Accessed 4 May 2011
Intel: Intel and content protection. http://www.intel.com (2010). Accessed 4 May 2011
Jonker, H.L., Mauw, S.: Core security requirements of DRM systems. In: Symposium on Information Theory in the Benelux (2004)
Latoschik, M.E., Biermann, P., Wachsmuth, I.: Knowledge in the loop: semantics representation for multimodal simulative environments. In: Proceedings of the 5th International Symposium on Smart Graphics, Frauenwoerth Cloister, pp. 25–39 (2005)
Lian, S., Kannelopoulos, D., Ruffo, G.: Recent advances in multimedia information system security. Informatica 33(1), 3–24 (2009)
Linden Labs: Privacy and security in the second life enterprise beta. http://immersivespaces.com/media/files/2009/11/06/SL_Enterprise_Beta_Security_Whitepaper.pdf (2009). Accessed 4 May 2011
Lugrin, J., Cavazza, M.: Making sense of virtual environments: action representation, grounding and common sense. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 225–234. ACM, New York (2007)
Mennecke, B.E., McNeill, D., Ganis, M., Roche, E.M., Bray, D.A., Konsynski, B., Townsend, A.M., Lester, J.: Second life and other virtual worlds: a roadmap for research. Commun. AIS 22, 371–388 (2008)
Moses, T. (ed.): eXtensible Access Control Markup Language (XACML) Version 2.0. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf (2005). Accessed 4 May 2011
Octaga Collaboration Server. http://www.octaga.com/ (2011). Accessed 4 May 2011
Open Cobalt. http://www.opencobalt.org/ (2011). Accessed 4 May 2011
Open Simulator. http://opensimulator.org/wiki/Main_Page (2011). Accessed 4 May 2011
Open Wonderland. http://openwonderland.org/ (2011). Accessed 4 May 2011
OSgrid. http://www.osgrid.org/ (2011). Accessed 4 May 2011
Pittarello, F., De Faveri, A.: Semantic description of 3D environments: a proposal based on web standards. In: Proceedings of the 11th international Conference on 3D Web Technology, pp. 85–95. ACM, New York (2006)
Priebe, T., Dobmeier, W., Schläger, C., Kamprath, N.: Supporting attribute-based access control in authentication and authorization infrastructures with ontologies. J. Softw. 2(1), 27–38 (2007)
Qiu, Z.M., Kok, K.F., Wong, Y.S., Fuh, J.Y.: Role-based 3D visualisation for asynchronous PLM collaboration. Comput. Ind. 58(8–9), 747–755 (2007)
Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, pp. 47–63. ACM, New York (2000)
Second Life. http://secondlife.com (2011). Accessed 4 May 2011
Thuraisingham, B.: Security and privacy for multimedia database management systems. Multimed. Tools Appl. 33(1), 13–29 (2007)
Walczak, K.: Beh-VR: modeling behavior of dynamic virtual reality contents. In: Zha, H. et al. (eds.) Interactive technologies and sociotechnical systems. LNCS, vol. 4270, pp. 40–51. Springer, Berlin (2006)
Walczak, K.: Structured design of interactive VR applications. In: The 13th International Symposium on 3D Web Technology Web3D, pp. 105–113. ACM, New York (2008)
Walczak, K.: VR-BML: behaviour modelling language for configurable VR applications. In: Ioannides, M., Addison, A., Georgopoulos, A., Kalisperis, L. (eds.) Digital Heritage. The 14th International Conference on Virtual Systems and MultiMedia VSMM’08, pp. 295–302. Archaeolingua, Budapest (2008)
Walczak, K., Wojciechowski, R., Wójtowicz, A.: Interactive production of dynamic 3D sceneries for virtual television studio. In: Proceedings of 7th Virtual Reality International Conference VRIC—Laval Virtual, Laval, pp. 167–177 (2005)
Wang, X., Demartini, T., Wragg, B., Paramasivam, M., Barlas, C.: The mpeg-21 rights expression language and rights data dictionary. IEEE Trans. Multimed. 7(3), 408–417 (2005)
Wang, Y., Ajoku, P., Brustoloni, J., Nnaji, B.J.: Intellectual property protection in collaborative design through lean information modeling and sharing. J. Comput. Inf. Sci. Eng. 6, 149 (2006)
Wójtowicz, A.: (2010). Selective semantic modeling method SSM for building secure multiaccess virtual environments. PhD Dissertation, Gdańsk (2010)
Wójtowicz, A., Cellary, W.: Representing user privileges in object-oriented virtual reality systems. In: Camarinha-Matos, L., Pereira, P., Ribeiro, L. (eds.) Emerging Trends in Technological Innovation. Springer, Berlin (2010)
Wójtowicz, A., Cellary, W.: Access control model for dynamic VR applications. In: Rea, A. (ed.) Security in Virtual Worlds, 3D Webs, and Immersive Environments. Models Dev. Interact. Manage. IGI Global, Hershey (2011)
Zeng, W., Yu, H., Lin, C.: Multimedia Security Technologies for Digital Rights Management. Academic Press, San Diego (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag London Limited
About this chapter
Cite this chapter
Wójtowicz, A. (2012). Secure User-Contributed 3D Virtual Environments. In: Cellary, W., Walczak, K. (eds) Interactive 3D Multimedia Content. Springer, London. https://doi.org/10.1007/978-1-4471-2497-9_7
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2497-9_7
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2496-2
Online ISBN: 978-1-4471-2497-9
eBook Packages: Computer ScienceComputer Science (R0)