Quality of protection for mobile multimedia applications

Chui Sian Ong, K. Nahrstedt, Wanghong Yuan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In traditional computer systems, security is typically provided in a one-or-nothing manner; the system is either secure or insecure. Such an approach is insufficient for pervasive environments that contain heterogenous devices with varying computing resources. The small, portable handheld devices are often left unsecured due to their limited computing power. The approach is also inadequate for multimedia applications that require security as a controllable service attribute to maintain performance quality of service to levels that are acceptable to the users. Hence, we need a tunable and differentiable security framework. In this paper, we present a quality of protection (QoP) framework that resolves the inadequacies of the one-or-nothing approach by providing differential security levels for different device, user and application security requirements and preferences. We show that our QoP framework is necessary for multimedia applications to achieve the best possible security and performance levels in pervasive environments.

Original languageEnglish (US)
Title of host publicationProceedings - 2003 International Conference on Multimedia and Expo, ICME
PublisherIEEE Computer Society
PagesII137-II140
ISBN (Electronic)0780379659
DOIs
StatePublished - 2003
Event2003 International Conference on Multimedia and Expo, ICME 2003 - Baltimore, United States
Duration: Jul 6 2003Jul 9 2003

Publication series

NameProceedings - IEEE International Conference on Multimedia and Expo
Volume2
ISSN (Print)1945-7871
ISSN (Electronic)1945-788X

Other

Other2003 International Conference on Multimedia and Expo, ICME 2003
Country/TerritoryUnited States
CityBaltimore
Period7/6/037/9/03

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Quality of protection for mobile multimedia applications'. Together they form a unique fingerprint.

Cite this