Manoj N. Revankar, (4JN06CS042) : Presented by
Manoj N. Revankar, (4JN06CS042) : Presented by
Presented by
Manoj N. Revankar, (4JN06CS042)
Under the Guidance of
Mr. Manohar Nelli V. B.E. ,
Lecturer, Dept. of CS&E
The security mechanisms that could prevent such issues must be non-invasive
to the users, should be capable of being applied easily by the content creators.
W3C and OASIS, the major standardization bodies within the Internet
domain, have been working on creating XML based security standards for
web-based applications.
•The interactive cluster contains several tracks, which form chapters for
video/audio playlist and optionally manifest (application).
•It is used to representing interactive applications. The interactive
application refers to a part of the overall content that can be executed by
the optical disc player.
Manifest
Markup
Submarkup
Code
Script
Access Control
•XACML specification proposed by OASIS.
•XACML describes how to interpret the policies.
Key Management
•Using XKMS given by W3C.
Since the interactive cluster is markup based, the XML digital signature can be
used to sign/verify the interactive cluster in its entirety or can be used to
sign/verify at track level.
<Signature>
<SignedInfo>
<SignatureMethod />
<CanonicalizationMethod />
<Reference>
<Transforms>
<DigestMethod>
<DigestValue>
</Reference>
<Reference /> etc.
</SignedInfo>
<SignatureValue />
<KeyInfo />
<Object />
</Signature>
Reference
DigestMethod specifies the hash algorithm before applying the hash.
DigestValue contains the result of applying the hash algorithm to the
transformed resource(s).