163,806 research outputs found

    Cooperating broadcast and cellular conditional access system for digital television

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The lack of interoperability between Pay‐TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay‐TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay‐TV systems. This paper presents a novel end‐to‐end system architecture for Pay‐TV systems cooperating mobile and broadcasting technologies. It provides a cost‐effective, scalable, dynamic and secure access control mechanism supporting converged services and new business opportunities in Pay‐TV systems. It enhances interactivity, security and potentially reduces customer attrition and operational cost. In this platform, service providers can effectively interact with their customers, personalise their services and adopt appropriate security measures. It breaks up the rigid relationship between a viewer and set‐top box as imposed by traditional conditional access systems, thus, a viewer can fully enjoy his entitlements via an arbitrary set‐top box. Having thoroughly considered state‐of‐the‐art technologies currently being used across the world, the thesis highlights novel use cases and presents the full design and implementation aspects of the system. The design section is enriched by providing possible security structures supported thereby. A business collaboration structure is proposed, followed by a reference model for implementing the system. Finally, the security architectures are analysed to propose the best architecture on the basis of security, complexity and set‐top box production cost criteria

    Understanding and Improving Security of the Android Operating System

    Get PDF
    Successful realization of practical computer security improvements requires an understanding and insight into the system\u27s security architecture, combined with a consideration of end-users\u27 needs as well as the system\u27s design tenets. In the case of Android, a system with an open, modular architecture that emphasizes usability and performance, acquiring this knowledge and insight can be particularly challenging for several reasons. In spite of Android\u27s open source philosophy, the system is extremely large and complex, documentation and reference materials are scarce, and the code base is rapidly evolving with new features and fixes. To make matters worse, the vast majority of Android devices in use do not run the open source code, but rather proprietary versions that have been heavily customized by vendors for product differentiation. Proposing security improvements or making customizations without sufficient insight into the system typically leads to less-practical, less-efficient, or even vulnerable results. Point solutions to specific problems risk leaving other similar problems in the distributed security architecture unsolved. Far-reaching general-purpose approaches may further complicate an already complex system, and force end-users to endure significant performance and usability degradations regardless of their specific security and privacy needs. In the case of vendor customization, uninformed changes can introduce access control inconsistencies and new vulnerabilities. Hence, the lack of methodologies and resources available for gaining insight about Android security is hindering the development of practical security solutions, sound vendor customizations, and end-user awareness of the proprietary devices they are using. Addressing this deficiency is the subject of this dissertation. New approaches for analyzing, evaluating and understanding Android access controls are introduced and used to create an interactive database for use by security researchers as well as system designers and end-user product evaluators. Case studies using the new techniques are described, with results uncovering problems in Android\u27s multiuser framework and vendor-customized System Services. Finally, the new insights are used to develop and implement a novel virtualization-based security architecture that protects sensitive resources while preserving Android\u27s open architecture and expected levels of performance and usability

    Bao: A Lightweight Static Partitioning Hypervisor for Modern Multi-Core Embedded Systems

    Get PDF

    Lifeworld Inc. : and what to do about it

    Get PDF
    Can we detect changes in the way that the world turns up as they turn up? This paper makes such an attempt. The first part of the paper argues that a wide-ranging change is occurring in the ontological preconditions of Euro-American cultures, based in reworking what and how an event is produced. Driven by the security – entertainment complex, the aim is to mass produce phenomenological encounter: Lifeworld Inc as I call it. Swimming in a sea of data, such an aim requires the construction of just enough authenticity over and over again. In the second part of the paper, I go on to argue that this new world requires a different kind of social science, one that is experimental in its orientation—just as Lifeworld Inc is—but with a mission to provoke awareness in untoward ways in order to produce new means of association. Only thus, or so I argue, can social science add to the world we are now beginning to live in

    Portmerion, Proportion and Perspective

    Get PDF
    The holiday village of Portmerion was created by Bertram Clough Williams-Ellis (1883 1978) over a period of fifty-one years, starting in 1926. It was grade II listed in 1971. However, Portmerion has become a part of western popular culture rather than of mainstream architectural history. Its use as the setting for the cult 1967 television series “The Prisoner” ensures continued worldwide interest and a constant stream of visitors. Williams Ellis’ design methods were empirical, initial designs being adjusted by eye on site in close collaboration with trusted builders. This paper analyses the development of Portmerion as a gesamtkunstwerk; considering the experience of movement through the village as a dynamic composition of shifting vistas, focussing the visitor on a series of constructed views. Through this analysis, Portmerion is revealed as both a manifestation of the architecture of pleasure and an exercise in the pleasure of architecture

    Governing by internet architecture

    Get PDF
    In the past thirty years, the exponential rise in the number of Internet users around the word and the intensive use of the digital networks have brought to light crucial political issues. Internet is now the object of regulations. Namely, it is a policy domain. Yet, its own architecture represents a new regulative structure, one deeply affecting politics and everyday life. This article considers some of the main transformations of the Internet induced by privatization and militarization processes, as well as their consequences on societies and human beings.En los Ășltimos treinta años ha crecido de manera exponencial el nĂșmero de usuarios de Internet alrededor del mundo y el uso intensivo de conexiones digitales ha traĂ­do a la luz cuestiones polĂ­ticas cruciales. Internet es ahora objeto de regulaciones. Es decir, es un ĂĄmbito de la polĂ­tica. AĂșn su propia arquitectura representa una nueva estructura reguladora, que afecta profundamente la polĂ­tica y la vida cotidiana. Este artĂ­culo considera algunas de las principales transformaciones de Internet inducida por procesos de privatizaciĂłn y militarizaciĂłn, como tambiĂ©n sus consecuencias en las sociedades y en los seres humanos

    A novel DSM philosophy for building integrated renewable systems

    Get PDF
    This paper presents an overview of a novel concept in IT network design and power control focused on matching building integrated renewable power generation with local demands. It describes how this is achieved through combination of energy demand reduction and dynamic utilisation of embedded energy storage in a robust, efficient and cost effective manner. A brief overview of the main features of the design is given in terms of its intended benefits as an integrated system. The load components and distribution topology are described for this experimental system within the limits set by the capacity, capabilities and desired function of the network. Power supply to the network is described as including a back-up source to the photovoltaic (PV) source to add functionality and stability with no requirements for undesirable exporting of excess PV generation. The necessary configuration of the renewable array integrating with the network is also highlighted with an example compatible solar module device. A trial of the technology and demand management control in a high profile office building is described. This trial in a live working environment is providing invaluable real world data to compare against modelling and network simulation results
    • 

    corecore