44,791 research outputs found
Video Chat Application for Facebook
This project is mainly written for the facebook users. In todayâs world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site. Like all other social networking web sites, Facebook also provides many features to attract more and more users. But it lacks in providing the most important feature of social networking, i.e. video chat. I explore the different options and requirements needed to build the video chat application. I have also described the integration of the application with the facebook
Delivering Live Multimedia Streams to Mobile Hosts in a Wireless Internet with Multiple Content Aggregators
We consider the distribution of channels of live multimedia content (e.g., radio or TV broadcasts) via multiple content aggregators. In our work, an aggregator receives channels from content sources and redistributes them to a potentially large number of mobile hosts. Each aggregator can offer a channel in various configurations to cater for different wireless links, mobile hosts, and user preferences. As a result, a mobile host can generally choose from different configurations of the same channel offered by multiple alternative aggregators, which may be available through different interfaces (e.g., in a hotspot). A mobile host may need to handoff to another aggregator once it receives a channel. To prevent service disruption, a mobile host may for instance need to handoff to another aggregator when it leaves the subnets that make up its current aggregator�s service area (e.g., a hotspot or a cellular network).\ud
In this paper, we present the design of a system that enables (multi-homed) mobile hosts to seamlessly handoff from one aggregator to another so that they can continue to receive a channel wherever they go. We concentrate on handoffs between aggregators as a result of a mobile host crossing a subnet boundary. As part of the system, we discuss a lightweight application-level protocol that enables mobile hosts to select the aggregator that provides the �best� configuration of a channel. The protocol comes into play when a mobile host begins to receive a channel and when it crosses a subnet boundary while receiving the channel. We show how our protocol can be implemented using the standard IETF session control and description protocols SIP and SDP. The implementation combines SIP and SDP�s offer-answer model in a novel way
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European
countries. eID is typically used to authenticate to government e-services, but
is also used for other services, such as public transit, e-banking, and
physical security access control. Typical eID tokens take the form of physical
smart cards, but successes in merging eID into phone operator SIM cards show
that eID tokens integrated into a personal device can offer better usability
compared to standalone tokens. At the same time, trusted hardware that enables
secure storage and isolated processing of sensitive data have become
commonplace both on PC platforms as well as mobile devices.
Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of
the Trusted Platform Module (TPM) specification. We propose an eID architecture
based on the new, rich authorization model introduced in the TCGs TPM 2.0. The
goal of the design is to improve the overall security and usability compared to
traditional smart card-based solutions. We also provide, to the best our
knowledge, the first accessible description of the TPM 2.0 authorization model.Comment: This work is based on an earlier work: Citizen Electronic Identities
using TPM 2.0, to appear in the Proceedings of the 4th international workshop
on Trustworthy embedded devices, TrustED'14, November 3, 2014, Scottsdale,
Arizona, USA, http://dx.doi.org/10.1145/2666141.266614
AAA architectures applied in multi-domain IMS (IP multimedia subsystem)
There is a group of communication services that use\ud
resources from multiple domains in order to deliver their service.\ud
Authorization of the end-user is important for such services,\ud
because several domains are involved. There are no current\ud
solutions for delivering authentication, authorization and\ud
accounting (AAA) to multi-domain services. In our study we\ud
present two architectures for the delivery of AAA to such\ud
services. The architectures are analyzed on their qualitative\ud
aspects. A result of this analysis is that direct interconnection of\ud
AAA servers is an effective architectural solution. In current\ud
multi-domain IP Multimedia Subsystem (IMS) architectures,\ud
direct interconnection of AAA servers, such as the Home\ud
Subscriber Servers (HSS), is not yet possible. In this paper we\ud
argue and recommend to extend the IMS specification by adding\ud
a new interface to HSS in order to support the direct\ud
interconnection of HSS/AAA servers located in different IMS\ud
administrative domains
Evaluation of the NAS-ILAB Matrix for Monitoring International Labor Standards: Project Report
The Bureau of International Labor Affairs (ILAB) engaged the National Research Council of the National Academy of Sciences (NAS) to recommend a method to monitor and evaluate labor conditions in a given country. The method focuses on 5 labor standards: freedom of association and collective bargaining, forced or compulsory labor, child labor, discrimination, and acceptable conditions of work
- âŚ