2009
DOI: 10.20870/ijvr.2009.8.4.2745
|View full text |Cite
|
Sign up to set email alerts
|

Analysis Domain Model for Shared Virtual Environments

Abstract: The field of shared virtual environments, which also encompasses online games and social 3D environments, has a system landscape consisting of multiple solutions that share great functional overlap. However, there is little system interoperability between the different solutions. A shared virtual environment has an associated problem domain that is highly complex raising difficult challenges to the development process, starting with the architectural design of the underlying system. This paper has two main con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 255 publications
(221 reference statements)
0
3
0
1
Order By: Relevance
“…The security concerns focus on e-commerce, demonstrating a need for clarity and transparency on when actions are secure, and privacy is assured. Oliveira et al (2009) discuss interoperability between different solutions, despite several solutions sharing great functional overlap. The paper presents a broad domain analysis on shared virtual environments, providing readers with a sense of how the parts are connected in a greater whole.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The security concerns focus on e-commerce, demonstrating a need for clarity and transparency on when actions are secure, and privacy is assured. Oliveira et al (2009) discuss interoperability between different solutions, despite several solutions sharing great functional overlap. The paper presents a broad domain analysis on shared virtual environments, providing readers with a sense of how the parts are connected in a greater whole.…”
Section: Related Workmentioning
confidence: 99%
“…The attack surface can be considered to be like a data-flow pipeline. This model is loosely inspired by Oliveira et al (2009), the key difference being we look at the analysis domain from the attacker's perspective. We assume that every device, and every sub-component of the device can have this model applied to it.…”
Section: I/o Attack Modelmentioning
confidence: 99%
“…It is important to bear in mind that the management of all WonderDAC permissions resides at the Wonderland server, as noted in Section 3.2. Aside from managing the issues of general access control and malicious clients, this configuration enables the owner of an object to efficiently assign their ownership to some other participant, avoiding some of the issues raised in [44]. Moreover, the centralization of access control affords us the ability to avoid problems such as deadlock when multiple participants attempt to utilize an object simultaneously (i.e., the Wonderland server becomes the system-of-record to sort things out).…”
Section: Use Case Scenariosmentioning
confidence: 99%
“…Facebook, YouTube, Wikipedia, Flickr). Οη Oliveira et al (2009) αλαθέξνπλ φηη ε απηνχ ηνπ είδνπο επηθάλεηα δηεπαθήο είλαη βαζηζκέλε ζην document paradigm.…”
Section: διςδιϊςταταunclassified