Show simple item record

dc.contributor.authorRoe, Michael
dc.date.accessioned2012-03-27T15:00:32Z
dc.date.available2012-03-27T15:00:32Z
dc.date.issued2011
dc.identifier.citationRoe , M 2011 , ' The metaplace security model ' , Lecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics , vol. 7114 , pp. 313-326 . https://doi.org/10.1007/978-3-642-25867-1_30
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 688464
dc.identifier.otherPURE UUID: e0e4c494-8f6b-4bcf-86ba-5922dbbd67ff
dc.identifier.otherScopus: 84855783030
dc.identifier.urihttp://hdl.handle.net/2299/8067
dc.description.abstractAs part of an ongoing project on the security of online games and virtual reality applications, we joined the open beta test of Metaplace, to carry out our own analysis of Metaplace's security mechanisms, and to observe what went wrong in practise during the beta test. The beta test version of Metaplace is particularly interesting because it went further than most online games in allowing "user generated content". For example, users were able to customize the game (or effectively, build their own game) by writing code that was run on the game server. This clearly has serious security implications, and Metaplace had its own unique security mechanisms to address the resulting issues. At the end of the beta test, Metaplace (then renamed Island Life) was changed to be more modest in the forms of user generated content that were permitted. The beta test was therefore a one-off opportunity to see if these mechanisms worked in practise. We found that some well-known operating systems security issues reappeared in new forms in Metaplace: anyone who in the future would like to build a game with this degree of user-generated content in their game would do well to be aware of these issues. The obvious competitor to Metaplace was Linden Lab's Second Life, which also permits advanced forms of user-generated content. Second Life's approach to security is significantly different from Metaplace, and there both advantages and disadvantages: we give a more detailed comparison later in the paper.en
dc.format.extent14
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
dc.titleThe metaplace security modelen
dc.contributor.institutionSchool of Computer Science
dc.description.statusPeer reviewed
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=84855783030&partnerID=8YFLogxK
rioxxterms.versionofrecordhttps://doi.org/10.1007/978-3-642-25867-1_30
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record