25,905 research outputs found

    Analysis of roles and position of mobile network operators in mobile payment infrastructure

    Get PDF
    A number of different mobile payment solutions have been presented the last decade. The phone subscription with its security mechanisms are used for user identification and payments. This is the case for SMS based payment and ticketing systems that are getting more and more popular. However, there are other ways to implement a Trusted Element (TE) , where a SIM card architecture is only one. It can be in the mobile phone, as a separate integrated circuit, as an optional customer deployed plug-in device (e.g., microSD) or be running as an application on a server existing entirely as software. In this paper we analyze what roles and responsibilities different actors have in different types of mobile payments solutions. The main focus is on the implications for the mobile operator business. It turns out that new types of intermediary actors in most cases play an important role. Sometimes mobile operators are not even involved. The emergence of new payment together with other non-SIM card based TE solutions opens up for many different market scenarios for mobile payment services. --

    UNICORE and GRIP: experiences of grid middleware development

    No full text
    We describe our experiences with the UNICORE Grid environment. Several lessons of general applicability can be drawn in regard to user uptake and security. The principal lesson is that more effort should be taken to be made to meet the needs of the target user community of the middleware development. Novel workflow strategies, in particular, should not be imposed on an existing community

    Development of a building information modelling (BIM) migration path model for construction professionals

    Get PDF
    The construction professionals have the notion that by implementing Building Information Modelling (BIM) in construction could overcome problems such as delay, cost overrun, clashes in project design and undesirable quality in construction. However, they failed to take the advantages of the BIM benefit as they are still trying to find the best way to take on board the BIM into current practices. Most of the professionals do not know ‘when’ and ‘how’ to apply BIM throughout the construction lifecycle. Several research models related to BIM has been developed to improve and encourage BIM implementation. Nevertheless, the developed models have limitations in highlighting the steps involved that could assist the construction professionals in implementing BIM effectively in Malaysia. Therefore, this research is aimed to develop a model that would be able to assist Malaysian construction professionals in implementing BIM in a structured way. A semi-structured interview was carried out with respondents that have various experienced and currently involved in BIM projects in the Malaysian construction industry. Findings show that the construction professionals are lacking in knowledge and experience in using BIM in various stages of construction. Thus, they were unable to fully capitalise the benefit of 3D models. Migration path model was proposed and evaluated as a strategic approach for BIM implementation in the Malaysian construction industry. The identification of five (5) activities (BIM Awareness, Develop BIM Strategy, Implement BIM, Monitor BIM and Expand BIM Implementation) with the three (3) enablers (BIM work contract, BIM work process and BIM technology) in the model is expected to be able to assist construction professionals to implement BIM with the right BIM concept and later, the benefit could be obtained for improving construction project. The proposed model could be as a guideline for construction professionals in implementing BIM, specifically in countries that new in BIM. The model is also expected to be able to fill the gap in BIM implementation by supporting the initiatives by the Malaysian government for increasing productivity in construction projects by using new technology like BIM

    Mobile integrated conditional access system

    Get PDF
    This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Follow-me service that enables subscribers to access their entitlements via an arbitrary set-top box

    A cooperative cellular and broadcast conditional access system for Pay-TV systems

    Get PDF
    This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.The lack of interoperability between Pay-TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay-TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay-TV systems. As a result, this paper presents the Mobile Conditional Access System (MICAS) as an end-to-end access control solution for Pay-TV systems. It incorporates the mobile and broadcasting systems and provides a platform whereby service providers can effectively interact with their customers, personalize their services and adopt appropriate security measurements. This would result in the decrease of operating expenses and increase of customers' satisfaction in the system. The paper provides an overview of state-of-the-art conditional access solutions followed by detailed description of design, reference model implementation and analysis of possible MICAS security architectures.Strategy & Technology (S&T) Lt

    Auctioning Bulk Mobile Messages

    Get PDF
    The search for enablers of continued growth of SMS traffic, as well asthe take-off of the more diversified MMS message contents, open up forenterprises the potential of bulk use of mobile messaging , instead ofessentially one-by-one use. In parallel, such enterprises or valueadded services needing mobile messaging in bulk - for spot use or foruse over a prescribed period of time - want to minimize totalacquisition costs, from a set of technically approved providers ofmessaging capacity.This leads naturally to the evaluation of auctioning for bulk SMS orMMS messaging capacity, with the intrinsic advantages therein such asreduction in acquisition costs, allocation efficiency, and optimality.The paper shows, with extensive results as evidence from simulationscarried out in the Rotterdam School of Management e-Auction room, howmulti-attribute reverse auctions perform for the enterprise-buyer, aswell as for the messaging capacity-sellers. We compare 1- and 5-roundauctions, to show the learning effect and the benefits thereof to thevarious parties. The sensitivity will be reported to changes in theenterprise's and the capacity providers utilities and prioritiesbetween message attributes (such as price, size, security, anddelivery delay). At the organizational level, the paper also considersalternate organizational deployment schemes and properties for anoff-line or spot bulk messaging capacity market, subject to technicaland regulatory constraints.MMS;EMS;Mobile commerce;SMS;multi-attribute auctions
    • 

    corecore