35,386 research outputs found
A cooperative cellular and broadcast conditional access system for Pay-TV systems
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.The lack of interoperability between Pay-TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay-TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay-TV systems. As a result, this paper presents the Mobile Conditional Access System (MICAS) as an end-to-end access control solution for Pay-TV systems. It incorporates the mobile and broadcasting systems and provides a platform whereby service providers can effectively interact with their customers, personalize their services and adopt appropriate security measurements. This would result in the decrease of operating expenses and increase of customers' satisfaction in the system. The paper provides an overview of state-of-the-art conditional access solutions followed by detailed description of design, reference model implementation and analysis of possible MICAS security architectures.Strategy & Technology (S&T) Lt
Recommended from our members
Security architectures in mobile integrated pay-TV
This paper presents the design and describes the advantage of the state-of-the-art Mobile Integrated Conditional Access System (MICAS) concerning interoperability, personalisation, security and operational costs in Pay-TV systems. The Message Handling Subsystem is proposed and outlined together with âFollow-Meâ service, which proposed herewith to extend mobility and personalisation concepts on Pay-TV service
Mobile integrated conditional access system
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Follow-me service that enables subscribers to access their entitlements via an arbitrary set-top box
Cooperating broadcast and cellular conditional access system for digital television
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The lack of interoperability between PayâTV service providers and a horizontally integrated business transaction model have compromised the competition in the PayâTV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the PayâTV systems.
This paper presents a novel endâtoâend system architecture for PayâTV systems cooperating mobile and broadcasting technologies. It provides a costâeffective, scalable, dynamic and secure access control mechanism supporting converged services and new business opportunities in PayâTV systems. It enhances interactivity, security and potentially reduces customer attrition and operational cost. In this platform, service providers can effectively interact with their customers, personalise their services and adopt appropriate security measures. It breaks up the rigid relationship between a viewer and setâtop box as imposed by traditional conditional access systems, thus, a viewer can fully enjoy his entitlements via an arbitrary setâtop box.
Having thoroughly considered stateâofâtheâart technologies currently being used across the world, the thesis highlights novel use cases and presents the full design and implementation aspects of the system. The design section is enriched by providing possible security structures supported thereby. A business collaboration structure is proposed, followed by a reference model for implementing the system. Finally, the security architectures are analysed to propose the best architecture on the basis of security, complexity and setâtop box production cost criteria
Promises, Impositions, and other Directionals
Promises, impositions, proposals, predictions, and suggestions are
categorized as voluntary co-operational methods. The class of voluntary
co-operational methods is included in the class of so-called directionals.
Directionals are mechanisms supporting the mutual coordination of autonomous
agents.
Notations are provided capable of expressing residual fragments of
directionals. An extensive example, involving promises about the suitability of
programs for tasks imposed on the promisee is presented. The example
illustrates the dynamics of promises and more specifically the corresponding
mechanism of trust updating and credibility updating. Trust levels and
credibility levels then determine the way certain promises and impositions are
handled.
The ubiquity of promises and impositions is further demonstrated with two
extensive examples involving human behaviour: an artificial example about an
agent planning a purchase, and a realistic example describing technology
mediated interaction concerning the solution of pay station failure related
problems arising for an agent intending to leave the parking area.Comment: 55 page
Community-Based Security for the Internet of Things
With more and more devices becoming connectable to the internet, the number
of services but also a lot of threats increases dramatically. Security is often
a secondary matter behind functionality and comfort, but the problem has
already been recognized. Still, with many IoT devices being deployed already,
security will come step-by-step and through updates, patches and new versions
of apps and IoT software. While these updates can be safely retrieved from app
stores, the problems kick in via jailbroken devices and with the variety of
untrusted sources arising on the internet. Since hacking is typically a
community effort? these days, security could be a community goal too. The
challenges are manifold, and one reason for weak or absent security on IoT
devices is their weak computational power. In this chapter, we discuss a
community based security mechanism in which devices mutually aid each other in
secure software management. We discuss game-theoretic methods of community
formation and light-weight cryptographic means to accomplish authentic software
deployment inside the IoT device community
Challenging content exclusivity in network industries: the case of digital broadcasting
Interacting with network externalities and switching costs, exclusive dealings for premium contents in digital broadcasting markets allow incumbents to deny rivals critical mass and profitable market entry. A downstream company that acquires the exclusive rights to high-quality programming in the upstream market may obtain a competitive advantage over its rivals which suffer from negative externalities. Instead of fostering competition and innovation, exclusive licensing serves as an effective entry-deterrent strategy in order to preserve market power and to leverage monopolies. Although exclusivity for premium content has long been considered the only way for guaranteeing the remuneration of the vast investments in content production and platform infrastructure, this paper challenges the profitability of this exclusivity strategy in network industries. The paper questions the traditional economic assumptions underlying exclusivity of content and argues that the increasing emergence of multi-sided platforms in the broadcasting industry creates incentives for right holders to multi-home rather than single-home their contents. --Business model,digital broadcasting,exclusivity,bundling,shared access,innovation
Regression Monte Carlo for Microgrid Management
We study an islanded microgrid system designed to supply a small village with
the power produced by photovoltaic panels, wind turbines and a diesel
generator. A battery storage system device is used to shift power from times of
high renewable production to times of high demand. We introduce a methodology
to solve microgrid management problem using different variants of Regression
Monte Carlo algorithms and use numerical simulations to infer results about the
optimal design of the grid.Comment: CEMRACS 2017 Summer project - proceedings
- âŠ