Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/571878.571894acmconferencesArticle/Chapter ViewAbstractPublication PagescveConference Proceedingsconference-collections
Article

Security of runtime extensible virtual environments

Published: 30 September 2002 Publication History

Abstract

Distributed, real-time virtual environment (VE) architectures have traditionally been driven by quality of service (QOS) considerations, with little or no concern paid to security issues. With recent advancements in functionality, computing power and network bandwidth it has become practical to use VEs in sensitive areas such as product development with proprietary information and visualization of classified information. Consequently, previously ignored aspects of security need to be made a primary concern at the outset of designing a VE. In this paper we explore security concerns associated with a subtype of VEs: Runtime Extensible VEs (RTEVEs). We introduce a taxonomy of security issues, derived from a case study of NPSNET-V, with the goal of using this taxonomy to guide the formulation of security policy, requirements, and architectures for RTEVEs.

References

[1]
Benedens, O. Geometry-based watermarking of 3D models. IEEE Computer Graphics and Applications, 19, 1 (Jan./Feb. 1999), 46--55.
[2]
Berghel, H. Watermarking Cyberspace. Comm. ACM, 40, 11 (Nov. 1997), 19--24.
[3]
Bullock, A. and Benford, S. An access control framework for multi-user collaborative environments. In Proc. Int. SIGGROUP Conf. Supporting Group Work, ACM (Phoenix, Ariz., Nov. 1999), 140--149.
[4]
Capps, M., McGregor, D., Brutzman, D., and Zyda, M. NPSNET-V: A New beginning for dynamically extensible virtual environments. IEEE Computer Graphics and Applications 20, 5 (Oct. 2000), 12--15.
[5]
Capps, M. and Stotts, D. Research issues in developing networked virtual realities: Working group report on distributed system aspects of sharing a virtual reality. In Proc. Sixth Workshop Enabling Technologies: Infastructure for Collaborative Enterprises, IEEE (Cambridge, Mass., June 1997), 205--211.
[6]
Curtis, P. and Nichols, D. MUDs grow up: Social virtual reality in the real world. In Digest of Papers for COMPCON, IEEE (San Francisco, Calif., Feb. 1994), 193--200.
[7]
Forrest, S., Hofmeyr, S., and Somayaji, A. Computer immunology. Comm. ACM 40, 3 (Oct. 97), 88--96.
[8]
Foster, I., Karonis, T., and Kesselman, C. Managing security in high-performance distributed computations. Cluster Computing 1, 1 (1998), 95--107.
[9]
Foster, I., Kesselman, C., Tsudik, G., and Tuecke, S. A security architecture for computational grids. In Proc. Fifth Conf. Computer and Communications Security. ACM (San Francisco, Calif., Nov. 1998), 83--92.
[10]
Foster, I., Kesselman, C., and Tuecke, S. The anatomy of the grid: enabling scalable virtual organizations. Int. J. Supercomputer Applications 15, 3 (Fall 2001), 200--222.
[11]
Jayaram, N. D. and Morse, P. L. R. Network security: A taxonomic view. In European Conf. Sec. and Detection, IEEE (London, Apr. 1997), 124-127.
[12]
Kapolka, A., McGregor, D., and Capps, M. A unified component framework for dynamically extensible virtual environments. In Proc. Fourth Int. Conf. Collaborative Virtual Environments, ACM (Bonn, Germany, Sept. 2002).
[13]
Krasner,G., and Pope, S. A cookbook for using the model-view-controller user interface paradigm in smalltalk-80. J. Object-Oriented Prog. 1, 3 (Aug./Sep. 1988), 26--41.
[14]
LambdaMOO. <telnet://lambda.moo.mud.org:8888>
[15]
Landwehr, C. E., Bull A., McDermott, J., and Choi, W. A taxonomy of computer program security flaws. ACM Comput. Surveys 26, 3 (Sept. 1994), 211--254.
[16]
Macedonia, M. R. and Zyda, M. J. A taxonomy for networked virtual environments. IEEE Multimedia 4, 2 (Jan./Mar. 1997), 48--56.
[17]
Oliveira, M., Crowcroft, J., and Slater, M. Component framework infrastructure for virtual environ¿ments. In Proc. Third Int. Conf. Collabora¿tive Vir¿tual Environ¿ments, ACM (San Francisco, Calif., Sept. 2000), 139--146.
[18]
Oliveira, M., Crowcroft, J., Brutzman, D., and Slater, M. Components for distributed virtual envi¿ronments. In Proc. Symposium Virtual Re¿ality Softw. and Technol., ACM (London, Dec. 1999), 176--177.
[19]
Pettifer, S. and Marsh, J. Collaborative access model for shared virtual environments. In Proc. Tenth Int. Workshops Ena¿bling Technologies: Infrastruc¿ture for Collaborative Enter¿prises, IEEE (Cambridge, Mass, June 2001), 257-262.
[20]
Pritchard, M. How to hurt the hackers: the inside scoop on internet cheating and how you can combat it. Game Devel'oper 7, 6 (June 2000), 28--40.
[21]
Singhal, S. and Zyda, M. Networked Virtual Envi¿ronments: Design and Implementation. ACM Press-SIGGRAPH Se¿ries, New York, 1999.
[22]
Stillerman, M., Marceau, C., and Stillman, M. Intrusion detec¿tion for distributed applications. Comm. ACM 42, 7 (July 1999), 62--69.
[23]
Vigna, G. and Kemmerer, R. NetStat: A network-based intrusion detection approach. In Proc. Fourteenth Annual Computer Sec. Application Conf., ACM (Scottsdale, Ariz., Dec. 1998), 25--34.
[24]
Watsen, K. and Zyda, M. Bamboo: A portable system for dynami¿cally extensible, real-time, networked, vir¿tual environ¿ments. In Proc. Virtual Reality Annual Int. Symposium, IEEE (Atlanta, Ga., Mar. 1998), 252--259.

Cited By

View all
  • (2020)DoS Attacks, Triad and Privacy: Software Exposures in Microsoft, Apple and Google2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH)10.1109/SMART-TECH49988.2020.00028(53-58)Online publication date: Nov-2020
  • (2020)Vulnerabilities and Digital Violations in Software Products: Logistic Regression Analysis2020 International Conference on Cyber Warfare and Security (ICCWS)10.1109/ICCWS48432.2020.9292397(1-6)Online publication date: 20-Oct-2020
  • (2019)Cyber Security Threats and Challenges in Collaborative Mixed-RealityFrontiers in ICT10.3389/fict.2019.000056Online publication date: 9-Apr-2019
  • Show More Cited By

Index Terms

  1. Security of runtime extensible virtual environments

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CVE '02: Proceedings of the 4th international conference on Collaborative virtual environments
      September 2002
      170 pages
      ISBN:1581134894
      DOI:10.1145/571878
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 September 2002

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. collaborative environment
      2. computer security
      3. information assurance
      4. runtime extensible virtual environment
      5. security
      6. taxonomy
      7. virtual environment
      8. virtual reality

      Qualifiers

      • Article

      Conference

      CVE02: Collaborative Virtual Environments
      September 30 - October 2, 2002
      Bonn, Germany

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)DoS Attacks, Triad and Privacy: Software Exposures in Microsoft, Apple and Google2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH)10.1109/SMART-TECH49988.2020.00028(53-58)Online publication date: Nov-2020
      • (2020)Vulnerabilities and Digital Violations in Software Products: Logistic Regression Analysis2020 International Conference on Cyber Warfare and Security (ICCWS)10.1109/ICCWS48432.2020.9292397(1-6)Online publication date: 20-Oct-2020
      • (2019)Cyber Security Threats and Challenges in Collaborative Mixed-RealityFrontiers in ICT10.3389/fict.2019.000056Online publication date: 9-Apr-2019
      • (2008)Security Issues of Collaborative Review SystemProceedings of the Fifth International Conference on Information Technology: New Generations10.1109/ITNG.2008.147(581-586)Online publication date: 7-Apr-2008
      • (2004)A multimedia workflow-based collaborative engineering environment for oil & gas industryProceedings of the 2004 ACM SIGGRAPH international conference on Virtual Reality continuum and its applications in industry10.1145/1044588.1044609(112-119)Online publication date: 16-Jun-2004

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media