Skip to main content

Secure User-Contributed 3D Virtual Environments

  • Chapter

Abstract

This chapter deals with the problem of access control in 3D virtual environments which are interactive, behavior-rich, multi-user, and based on user-contributed content. Traditional coarse-grained and geometry-centric privilege modeling methods are not sufficient for such environments. New methods are required that concern not only geometrical models, their relationships and structure, but also inter-object behavioral interactions. In this chapter, a method called Selective Semantic Modeling (SSM) is described. The SSM method enables modeling of privileges for behavioral objects with respect to their semantics. The SSM method is based on the concept of semantic operations, which are generated at run-time from the current content structure of a virtual environment and are applicable to the access control model as a part of a privilege. Semantic consistency of the privilege is guaranteed by a two-phase regeneration and validation mechanism, so that user privileges can be expressed in a precise, semantically accurate and flexible way.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abelson, H., Adida, B., Linksvayer, M., Yergler, N.: ccREL: the creative commons rights expression language. Version 1.0. http://wiki.creativecommons.org/images/d/d6/Ccrel-1.0.pdf (2008). Accessed 4 May 2011

  2. Active Worlds. http://www.activeworlds.com (2011). Accessed 4 May 2011

  3. Bitmanagement BS Collaborate. http://www.bitmanagement.com/products/server/bs-collaborate (2011). Accessed 4 May 2011

  4. Cera, D.D., Kim, T., Han, J., Regli, W.C.: Role-based viewing envelopes for information protection in collaborative modeling. Comput. Aided Des. 36(1), 873–886 (2004)

    Article  Google Scholar 

  5. Craig, A., Sherman, W.R., Will, J.D.: Developing Virtual Reality Applications: Foundations of Effective Design. Morgan Kaufmann, San Mateo (2009)

    Google Scholar 

  6. ENISA: Virtual world, real money: security and privacy in massively-multiplayer online games and social and corporate virtual worlds. Position Paper of European Network and Information Security Agency. http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_security_privacy_virtualworlds.pdf (2008). Accessed 4 May 2011

  7. Fang, C., Peng, W., Ye, X., Zhang, S.: Multi-level access control for collaborative CAD. In: Proceedings of the 9th International Conference on Computer Supported Cooperative Work in Design, vol. 1, pp. 643–648 (2005)

    Chapter  Google Scholar 

  8. Gutierrez, M., Vexo, F., Thalmann, D.: Semantics-based representation of virtual environments. Int. J. Comput. Appl. Technol. 23, 229–238 (2005)

    Article  Google Scholar 

  9. Gutierrez, M., Vexo, F., Thalmann, D.: Stepping into Virtual Reality. Springer, Berlin (2008)

    Book  Google Scholar 

  10. Helmer, J.: Second life and virtual worlds. Learning light. http://www.norfolkelearningforum.co.uk/wp-content/uploads/2009/04/virtual-worlds_ll_oct_2007.pdf (2007). Accessed 4 May 2011

  11. Horn, D., Cheslack-Postava, E., Azim, T., Freedman, M.J., Levis, P.: Scaling virtual worlds with a physical metaphor. IEEE Pervasive Comput. 8(3), 50–54 (2009)

    Article  Google Scholar 

  12. Hypergrid security. In: Open Simulator Wiki. http://opensimulator.org/wiki/Hypergrid_Security (2011). Accessed 4 May 2011

  13. Intel: Intel and content protection. http://www.intel.com (2010). Accessed 4 May 2011

  14. Jonker, H.L., Mauw, S.: Core security requirements of DRM systems. In: Symposium on Information Theory in the Benelux (2004)

    Google Scholar 

  15. Latoschik, M.E., Biermann, P., Wachsmuth, I.: Knowledge in the loop: semantics representation for multimodal simulative environments. In: Proceedings of the 5th International Symposium on Smart Graphics, Frauenwoerth Cloister, pp. 25–39 (2005)

    Google Scholar 

  16. Lian, S., Kannelopoulos, D., Ruffo, G.: Recent advances in multimedia information system security. Informatica 33(1), 3–24 (2009)

    MathSciNet  Google Scholar 

  17. Linden Labs: Privacy and security in the second life enterprise beta. http://immersivespaces.com/media/files/2009/11/06/SL_Enterprise_Beta_Security_Whitepaper.pdf (2009). Accessed 4 May 2011

  18. Lugrin, J., Cavazza, M.: Making sense of virtual environments: action representation, grounding and common sense. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 225–234. ACM, New York (2007)

    Chapter  Google Scholar 

  19. Mennecke, B.E., McNeill, D., Ganis, M., Roche, E.M., Bray, D.A., Konsynski, B., Townsend, A.M., Lester, J.: Second life and other virtual worlds: a roadmap for research. Commun. AIS 22, 371–388 (2008)

    Google Scholar 

  20. Moses, T. (ed.): eXtensible Access Control Markup Language (XACML) Version 2.0. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf (2005). Accessed 4 May 2011

  21. Octaga Collaboration Server. http://www.octaga.com/ (2011). Accessed 4 May 2011

  22. Open Cobalt. http://www.opencobalt.org/ (2011). Accessed 4 May 2011

  23. Open Simulator. http://opensimulator.org/wiki/Main_Page (2011). Accessed 4 May 2011

  24. Open Wonderland. http://openwonderland.org/ (2011). Accessed 4 May 2011

  25. OSgrid. http://www.osgrid.org/ (2011). Accessed 4 May 2011

  26. Pittarello, F., De Faveri, A.: Semantic description of 3D environments: a proposal based on web standards. In: Proceedings of the 11th international Conference on 3D Web Technology, pp. 85–95. ACM, New York (2006)

    Google Scholar 

  27. Priebe, T., Dobmeier, W., Schläger, C., Kamprath, N.: Supporting attribute-based access control in authentication and authorization infrastructures with ontologies. J. Softw. 2(1), 27–38 (2007)

    Google Scholar 

  28. Qiu, Z.M., Kok, K.F., Wong, Y.S., Fuh, J.Y.: Role-based 3D visualisation for asynchronous PLM collaboration. Comput. Ind. 58(8–9), 747–755 (2007)

    Article  Google Scholar 

  29. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, pp. 47–63. ACM, New York (2000)

    Chapter  Google Scholar 

  30. Second Life. http://secondlife.com (2011). Accessed 4 May 2011

  31. Thuraisingham, B.: Security and privacy for multimedia database management systems. Multimed. Tools Appl. 33(1), 13–29 (2007)

    Article  Google Scholar 

  32. Walczak, K.: Beh-VR: modeling behavior of dynamic virtual reality contents. In: Zha, H. et al. (eds.) Interactive technologies and sociotechnical systems. LNCS, vol. 4270, pp. 40–51. Springer, Berlin (2006)

    Chapter  Google Scholar 

  33. Walczak, K.: Structured design of interactive VR applications. In: The 13th International Symposium on 3D Web Technology Web3D, pp. 105–113. ACM, New York (2008)

    Chapter  Google Scholar 

  34. Walczak, K.: VR-BML: behaviour modelling language for configurable VR applications. In: Ioannides, M., Addison, A., Georgopoulos, A., Kalisperis, L. (eds.) Digital Heritage. The 14th International Conference on Virtual Systems and MultiMedia VSMM’08, pp. 295–302. Archaeolingua, Budapest (2008)

    Google Scholar 

  35. Walczak, K., Wojciechowski, R., Wójtowicz, A.: Interactive production of dynamic 3D sceneries for virtual television studio. In: Proceedings of 7th Virtual Reality International Conference VRIC—Laval Virtual, Laval, pp. 167–177 (2005)

    Google Scholar 

  36. Wang, X., Demartini, T., Wragg, B., Paramasivam, M., Barlas, C.: The mpeg-21 rights expression language and rights data dictionary. IEEE Trans. Multimed. 7(3), 408–417 (2005)

    Article  Google Scholar 

  37. Wang, Y., Ajoku, P., Brustoloni, J., Nnaji, B.J.: Intellectual property protection in collaborative design through lean information modeling and sharing. J. Comput. Inf. Sci. Eng. 6, 149 (2006)

    Article  Google Scholar 

  38. Wójtowicz, A.: (2010). Selective semantic modeling method SSM for building secure multiaccess virtual environments. PhD Dissertation, Gdańsk (2010)

    Google Scholar 

  39. Wójtowicz, A., Cellary, W.: Representing user privileges in object-oriented virtual reality systems. In: Camarinha-Matos, L., Pereira, P., Ribeiro, L. (eds.) Emerging Trends in Technological Innovation. Springer, Berlin (2010)

    Google Scholar 

  40. Wójtowicz, A., Cellary, W.: Access control model for dynamic VR applications. In: Rea, A. (ed.) Security in Virtual Worlds, 3D Webs, and Immersive Environments. Models Dev. Interact. Manage. IGI Global, Hershey (2011)

    Google Scholar 

  41. Zeng, W., Yu, H., Lin, C.: Multimedia Security Technologies for Digital Rights Management. Academic Press, San Diego (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Limited

About this chapter

Cite this chapter

Wójtowicz, A. (2012). Secure User-Contributed 3D Virtual Environments. In: Cellary, W., Walczak, K. (eds) Interactive 3D Multimedia Content. Springer, London. https://doi.org/10.1007/978-1-4471-2497-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2497-9_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2496-2

  • Online ISBN: 978-1-4471-2497-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics