907 research outputs found

    User generated content for IMS-based IPTV

    Get PDF
    Includes abstract.Includes bibliographical references.Web 2.0 services have been on the rise due to improved bandwidth availability. Users can now connect to the internet with a variety of portable devices which are capable of performing multiple tasks. Due to this, services such as Voice over IP (VoIP), presence, social networks, instant messaging (IM) and Internet Protocol television (IPTV) to mention but a few, started to emerge...This thesis proposed a framework that will offer user-generated content on an IMS-Based IPTV and the framework will include a personalised advertising system..

    AnĂĄlisis del impacto tecnolĂłgico, legal y econĂłmico de IPTV en las condiciones actuales del mercado colombiano de las telecomunicaciones

    Get PDF
    La tecnologĂ­a conocida como "Internet Protocol Television" (IPTV) proporciona ricos servicios multimedia sobre redes IP y es ampliamente considerada como la nueva aplicaciĂłn estrella a travĂ©s de Internet. EstĂĄ generando un gran interĂ©s, especialmente en los potenciales proveedores del servicio, quienes estĂĄn anhelando desarrollar modelos de negocio exitosos que aseguren su supervivencia en este mercado emergente. El creciente interĂ©s por IPTV estĂĄ siendo impulsado por los notables avances de las tecnologĂ­as digitales y dispositivos electrĂłnicos de consumo, las tecnologĂ­as de redes de banda ancha, los servicios web, asĂ­ como mayores demandas de entretenimiento por parte de los consumidores y los proveedores de contenido. En Colombia, la televisiĂłn IP aĂșn no se ha posicionado de forma amplia y definitiva. Algunas empresas del mercado local han incursionado en este nuevo mercado desde hace unos cuatro años, empezando con UNE EPM Telecomunicaciones en el año 2008, seguida años mĂĄs tarde por otras compañías como EMCALI, ETB y TelefĂłnica Telecom [Muñoz, MartĂ­nez, Paz, 2009]. Pero, de cualquier manera, falta gran parte del camino para poder decir que la IPTV es un servicio totalmente establecido en el paĂ­s. Varias adecuaciones tecnolĂłgicas, legales y del mercado se han generado a partir del momento en que la televisiĂłn IP dio su primer paso en Colombia, y muchas mĂĄs estĂĄn por venir considerando que, de una u otra forma, esta nueva tecnologĂ­a terminarĂĄ estableciĂ©ndose en el mercado local, como ha sucedido con muchas otras anteriormente

    Evidence-informed regulatory practice: an adaptive response, 2005‑15

    Get PDF
    Overview: In this occasional paper, the ACMA reflects on its regulatory practice over the past 10 years; specifically, the role of research in evidence-informed decision-making and regulation. It looks at how the ACMA has used research in an environment of ongoing change to document and build evidence, inform public debate about regulation, and build capability among our stakeholders to make communications and media work in Australia’s national interest

    IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing

    Get PDF
    These days, the advancing of smart devices (e.g. smart phones, tablets, PC, etc.) capabilities and the increase of internet bandwidth enables IPTV service provider to extend their services to smart mobile devices. User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. In addition we used Lightweight content encryption to protect and reduce the content decode overload at mobile terminals. Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second

    MS IPTV audit collection services

    Get PDF
    Tese de mestrado em Segurança InformĂĄtica, apresentada Ă  Universidade de Lisboa, atravĂ©s da Faculdade de CiĂȘncias, 2011Microsoft Mediaroom Internet Protocol Television (MS IPTV), uma plataforma de televisĂŁo digital, levou o conceito de televisĂŁo a uma dimensĂŁo totalmente nova. MS IPTV Ă© um sistema onde o serviço de televisĂŁo digital Ă© entregue aos clientes usando Internet Protocol (IP), atravĂ©s de uma conexĂŁo de banda larga. Com o advento do IPTV começaram a aparecer novas situaçÔes relacionadas com a segurança da televisĂŁo, uma vez que, a infra-estrutura começou a ganhar complexidade e exposição a uma sĂ©rie de novos riscos. Por esta razĂŁo, a segurança numa infra-estrutura de MS IPTV nĂŁo Ă© apenas mais uma funcionalidade, mas sim uma necessidade. Podemos mesmo dizer que hoje em dia Ă© obrigatĂłrio aguçar o engenho para estar um passo Ă  frente dos atacantes, uma vez que estes estĂŁo sempre Ă  espera de uma brecha, para comprometer os sistemas. Uma infra-estrutura como o MS IPTV armazena por omissĂŁo dados relativos ao comportamento dos utilizadores ao nĂ­vel dos logs, no entanto esta informação sĂł se torna relevante se puder ser consultada e analisada com o objetivo de proporcionar uma compreensĂŁo a alto nĂ­vel sobre os diferentes padrĂ”es que estĂŁo a ocorrer nos servidores ou no comportamento dos utilizadores, uma tarefa que envolve poderosas tĂ©cnicas de data parsing. A tese apresenta uma abordagem que combina tĂ©cnicas de data parsing, a fim de analisar os logs relevantes da infra-estrutura de MS IPTV, com o objetivo principal de aumentar a segurança atravĂ©s da investigação dos tipos de informaçÔes adicionais que pode ser extraĂ­da. TentĂĄmos assim entender se Ă© possĂ­vel determinar que tipos de ataques estĂŁo a ser perpetrados contra a infra-estrutura MS IPTV, com base na anĂĄlise dos logs. Como o foco central desta tese estĂĄ no diagnĂłstico, propomos uma abordagem para descobrir ataques, onde os logs sĂŁo verificados para identificar grupos coerentes de ocorrĂȘncias susceptĂ­veis de constituir ataques que apelidĂĄmos de padrĂ”es. Nos testes, verificĂĄmos que a nossa abordagem consegue bons resultados na descoberta de ataques. Os resultados obtidos tĂȘm a vantagem adicional de poderem ser integrados na ferramenta de monitorização utilizada pelas equipas de operação dos sistemas da Portugal Telecom, o System Center Operations Manager (SCOM).Microsoft Mediaroom Internet Protocol TeleVision (MS IPTV), one of the platforms for digital TV, took television to an all new dimension level. MS IPTV is described as a system where a digital television service is delivered to consumers using the Internet Protocol over a broadband connection. Since the infrastructure started to gain complexity and exposure to a number of new risks, never envisaged situations related to television security started to appear. For this reason, MS IPTV security is not only a great asset, but also a necessity. Nowadays it is mandatory to sharpen the wit to get ahead of attackers, who are always waiting for a breach to compromise our systems. MS IPTV log servers collect information about user and system behavior. However, this information only becomes relevant if it can be queried and analyzed with the purpose of providing high-level understanding about the different patterns. This task must comprise powerful data parsing techniques, since MS IPTV is able to generate close to one terabyte of logs per day. This thesis presents an approach that combines data parsing techniques in order to analyze relevant MS IPTV logs, with the main objective to increase security through the investigation of what type of additional information can be extracted from the server log files of a MS IPTV platform. The thesis focus is on diagnosis, trying to understand if it is possible to determine what type of attacks are being perpetrated against the MS IPTV infrastructure. We propose an approach for discovering attacks, where the application logs are scanned to identify coherent groups of occurrences that we call patterns, which are likely to constitute attacks. Our results showed that our approach achieves good results in discovering potential attacks. Our output results can be integrated into the MS IPTV monitoring system tool SCOM (System Center Operations Manager), which is an additional advantage over the other monitoring and log management systems

    Six emerging trends in media and communications - occasional paper

    Get PDF
    This paper examines six emerging trends in media and communications, which highlight that consumers are increasingly using personalised access pathways to communications and content services that cut across different networks, devices and services. Introduction The ACMA monitors industry and consumer data to identify changes in the media and communications environment and their impact on regulatory settings. Previous ACMA research, such as Broken concepts1 and the Emerging issues2 series of papers, has identified areas of regulatory strain resulting from changes in this environment. The ACMA’s 2014 data collection program highlighted six further trends that are of particular interest as they indicate challenges to the regulatory frameworks within which the ACMA works. These trends illustrate how developments in communications device technologies and over-the-top (OTT) services and content offer both: new opportunities for businesses and individuals as consumers and citizens potential challenges to confident and optimal use of these new services. The evolving media and communications environment offers new ways to understand and achieve policy objectives, and may expose alternatives to ’black-letter’ regulation. However, changes in media and communications can also strain the effectiveness and efficiency of existing regulatory settings designed in an environment where content and communication services have been delivered by network owners over dedicated networks and devices. The selected trends highlight that consumers are increasingly using personalised access pathways to communications and content services that cut across different networks, devices and services. This paper looks at the implications of these six trends for existing regulatory settings

    The Changing Patterns of Internet Usage

    Get PDF
    The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be designed differently if it were designed from scratch today. This Essay explores emerging trends that are transforming the way end users are using the Internet and examine their implications both for network architecture and public policy. These trends include Internet protocol video, wireless broadband, cloud computing programmable networking, and pervasive computing and sensor networks. It discusses how these changes in the way people are using the network may require the network to evolve in new directions
    • 

    corecore