2010
DOI: 10.20870/ijvr.2010.9.1.2763
|View full text |Cite
|
Sign up to set email alerts
|

Discretionary Access Controls for a Collaborative Virtual Environment

Abstract: As collaborative virtual environments (CVEs) are more widely used, participant access to CVE objects and information becomes a significant concern. In virtual reality games, storefronts, classrooms, and laboratories, for example, the need to control access to spaces and objects is integral to the security of activities taking place there. However, limited access controls are typically available in CVEs. Often, such controls are course-grained, only protecting against movements by unauthorized participants into… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Another study by Timothy Wright and Greg Madey [22] emphasized the necessity of restricting access to spaces and objects, particularly in virtual reality games and educational settings. They proposed a method that allowed movement within a specific space and interaction with objects through discretionary access control.…”
Section: Related Workmentioning
confidence: 99%
“…Another study by Timothy Wright and Greg Madey [22] emphasized the necessity of restricting access to spaces and objects, particularly in virtual reality games and educational settings. They proposed a method that allowed movement within a specific space and interaction with objects through discretionary access control.…”
Section: Related Workmentioning
confidence: 99%
“…• Social interaction. Social interaction, spatial constraints, facilitating collaborative access (see Pettifer and Marsh, 2001;Tolone et al, 2005), proximity to other users, the use of space as access control (see Bullock and Benford, 1999) and programmed access controls (see Wright and Madey, 2010) can all potentially be exploited by an attacker. • Impact of immersion.…”
Section: Cmr Properties Relating To Securitymentioning
confidence: 99%
“…We propose to use intelligent objects, iObjects, as elements helping users to comply norms and if it is necessary to prevent forbidden actions (e.g., block entry to people who is less than 18 years old). WonderDAC allows to show or hide parts of a VW depending on the user and group profile . In contrast to WonderDAC, developed to control discretionary access basing on users and group permissions, our approach is more general allowing, for example, the control of access to spaces based on the history of user activities.…”
Section: Related Workmentioning
confidence: 99%