Quality of protection for mobile multimedia applications

Chui Sian Ong, K. Nahrstedt, Wanghong Yuan

Research output: Chapter in Book/Report/Conference proceedingConference contribution


In traditional computer systems, security is typically provided in a one-or-nothing manner; the system is either secure or insecure. Such an approach is insufficient for pervasive environments that contain heterogenous devices with varying computing resources. The small, portable handheld devices are often left unsecured due to their limited computing power. The approach is also inadequate for multimedia applications that require security as a controllable service attribute to maintain performance quality of service to levels that are acceptable to the users. Hence, we need a tunable and differentiable security framework. In this paper, we present a quality of protection (QoP) framework that resolves the inadequacies of the one-or-nothing approach by providing differential security levels for different device, user and application security requirements and preferences. We show that our QoP framework is necessary for multimedia applications to achieve the best possible security and performance levels in pervasive environments.

Original languageEnglish (US)
Title of host publicationProceedings - 2003 International Conference on Multimedia and Expo, ICME
PublisherIEEE Computer Society
ISBN (Electronic)0780379659
StatePublished - 2003
Event2003 International Conference on Multimedia and Expo, ICME 2003 - Baltimore, United States
Duration: Jul 6 2003Jul 9 2003

Publication series

NameProceedings - IEEE International Conference on Multimedia and Expo
ISSN (Print)1945-7871
ISSN (Electronic)1945-788X


Other2003 International Conference on Multimedia and Expo, ICME 2003
Country/TerritoryUnited States

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications


Dive into the research topics of 'Quality of protection for mobile multimedia applications'. Together they form a unique fingerprint.

Cite this