Rights management in architectures for distributed multimedia content applications

Size: px
Start display at page:

Download "Rights management in architectures for distributed multimedia content applications"

Transcription

1 Rights management in architectures for distributed multimedia content applications Jaime Delgado 1, Víctor Torres 2, Silvia Llorente 1, Eva Rodríguez 1 1 Universitat Politècnica de Catalunya, 2 Universitat Pompeu Fabra Abstract There are several initiatives working in the definition and implementation of distributed architectures that enable the development of distributed multimedia applications on top of them, while offering Digital Rights Management (DRM) features. In the paper, the main features of MPEG Extensible Middleware (MXM) [1], the Advanced IPTV terminal (AIT) [2] and DMAG [3] Multimedia Information Protection and Management System (MIPAMS) [4] are presented, while highlighting the common ground and differences between MIPAMS and the standards. A set of usage scenarios is proposed to show how MIPAMS enables the development of applications on top of it, which deal with the needs of content creators, distributors and consumers according to different business models. 1. Introduction Amongst distributed multimedia applications and Digital Rights Management (DRM) architectures that deal with multimedia content, there are three initiatives, all related with standards at different levels, which should be taken into consideration. On the one hand, the MPEG Extensible Middleware (MXM) [1] and the Advanced IPTV terminal (AIT) [2] are the main initiatives from standardization bodies. On the other hand, the DMAG [3] Multimedia Information Protection and Management System (MIPAMS) [4] is a relevant standards-based architecture implemented as the basis to develop further applications. MIPAMS is not the only architecture providing DRM features (refer to [5] for a survey), but we will focus on it in relation to the mentioned MPEG standards. We first concentrate on describing MIPAMS and how its services can be used in different usage scenarios that correspond to different existing business models, for which some real development examples and projects are presented. Then, we highlight their common ground and differences in some specific aspects and justify why some features in MIPAMS are different from MXM or AIT.

2 2 2. The DMAG s MIPAMS Architecture The DMAG s MIPAMS (Multimedia Information Protection and Management System) is a service-oriented DRM platform developed by the DMAG (Distributed Multimedia Applications Group) [3]. The MIPAMS architecture is based on the flexible web services approach, as consists of several modules and services, which provide a subset of the whole system functionality needed for governing and protecting multimedia content. One of the advantages of having service-oriented DRM functionality relies on the possibility of decoupling it into different subsystems depending on the needs of the application that is going to be implemented, while being able to share the same common services between different applications with different requirements, thus reducing costs. MIPAMS encompasses an important part of the content value chain, from content creation and distribution to its consumption by final users. User Authentication, Registration and Management Authentication Certification Certification Authority Public Key Retrieval for Token Verification Certification Resource Upload, Download and Encryption Content Key Generation and Registration Protection Key Retrieval User Application Intermediary Authorisation and Key Retrieval Object Registration and Certification Object Registration Reporting Authorisation Reporting Reporting User Offer Publication and Management, License Acquisition License Reporting Search Object, License, Report and Offer Search and Retrieval Fig. 1 DMAG-MIPAMS architecture. Figure 1 depicts the MIPAMS architecture, for which we provide a general overview of its components and the different services being offered. The Content (CS) enables applications to upload and download digital resources such as audio or video files, text documents, etc. Those resources can be optionally encrypted under request, according to the available encryption mechan-

3 isms it provides. If encryption is selected, the protection keys will be first requested to the Protection and then registered through the same service, once encryption is performed. Content upload requires content to be uniquely identified. Since MIPAMS deals with single resource objects, the identifier being associated to content will be the same used for the object that contains it, and must be passed as input argument. This identifier can be requested to the Object Registration prior to the content upload or obtained from an external application using MIPAMS (it depends on the scenario). The Object Registration (ORS) enables applications to request a digital representation of content and metadata (i.e. digital objects) to be generated and registered in the system. Content and metadata are packaged together following the MPEG-21 Digital Item [6] approach. Once registered, objects are digitally signed by the ORS so that they can be checked for authenticity and integrity. The ORS also provides unique identifiers for those applications that need to upload content to the CS, as already explained. The License (LS) deals with rights offers and the issuance of licenses. Rights offers are set up by content creators or rights holders after registering content. They include the rights being offered for acquisition by other users and the conditions being applicable to those rights. License issuance refers to the process by which a license is generated as the result of a rights purchase, acquisition or because a rights holder directly grants some user a set of rights. Licenses are expressed using MPEG-21 Rights Expression Language [7]. The Authorization (AS) checks whether a user owns any appropriate license that grants him the right to perform a requested action (e.g., play) over a digital object. The authorization is based on the mechanism defined in [7]. The AS shares the access to the license repository with the LS. If the user is able to perform the action and the requested content is encrypted, the AS will retrieve the encryption keys from the Protection and return them to the requesting application. This is the only means for accessing encryption keys, which is performed as an atomic operation. The Protection (PS) generates encryption keys upon request, registers encryption keys associated to uniquely identified content and provides the encryption keys for protected content to the AS. When using MPEG-21 Intellectual Property Management and Protection [8] scheme and descriptors, the PS also offers the possibility to download the protection tools being used by those applications that may be out-of-date. The User Application (UA) is the player, edition tool, browser or any other means that is managed by the user to deal with the DRM functionality, such as registering and accessing protected contents. The UA may have an internal trusted module or intermediary to enforce DRM, which consists of a secure local repository for licenses, protection information, offline operation reports and other critical data. In those cases, it may be responsible for estimating tool fingerprints, require offline authorizations, unprotect content, track offline operations and manage content protection information. 3

4 4 The Intermediary may be an integral part of the UA or otherwise be located in the server part (e.g. web portal, brokerage service) to reduce the UA complexity. It can be seen as a broker to whom the UA requires different operations to be performed, as object registration, content upload, rights offer management, license acquisition, authorization, etc. The Search (SS) enables applications to perform accurate searches amongst metadata in the MIPAMS system. That is, it is the front-end for requesting any information present in MIPAMS services databases. Thus, it can be used for searching content, licenses, offers or reports or a combination of them. The Reporting (RS) collects usage reports regarding the registration of objects, the issuance of licenses and the authorizations being performed. It is also capable of building standards-based representations of those reports, such as MPEG-21 Event Reports [9]. Those reports may be used for computing statistics as well as for billing or tracking purposes. The Authentication (ATS) is needed to authenticate the identity of users. It generates SAML (Security Assertion Markup Language [10])-based tokens that identify MIPAMS users. Any service in the MIPAMS architecture will require a token argument to be provided in order to authenticate users. Tokens are digitally signed by the ATS, so that they can be checked for authenticity and integrity by the receiving service. Moreover, the ATS deals with user registration and management (i.e. personal data modification, user account deactivation, etc.). Finally, there is a need for having a recognized Certification Authority (CA), which issues credentials for the different Components and Actors in the system, as X.509 certificates and private keys for the different architectural components. 3. MXM and AIT The MPEG Extensible Middleware (MXM) [1] is an initiative of the MPEG standardisation group (ISO/IEC JTC1/SC29 WG11). This standard specification defines a middleware platform and a complete set of APIs and protocols for the management of digital content. It promotes the reusability of MPEG technologies that provide the required functionalities to the interoperable Digital Rights Management architecture described in [11]. The MXM standard comprises four public documents, which include the MXM architecture and technologies [12], MXM application programming interface [13], MXM reference software [14] and MXM protocols [15]. On the other hand, the Advanced IPTV (AIT) [2] is joint initiative of MPEG and ITU-T SG16. These two groups are jointly conducting the standardisation of a set of protocols and interfaces, which will enable new multimedia services in different environments, for example broadcasting. MPEG and ITU-T SG16 defined the requirements [16] for the Advanced IPTV terminal, and they also identified a set of candidate existing technologies that satisfied some of them. Then, a Call for

5 5 Proposals was issued in January 2010 and the responses, which fulfil some of the requirements, were evaluated during the 92nd MPEG meeting (April 2010). Since some of the requirements have not received enough contributions, a second Call for Proposals [17] has been launched taking into account the contributions received in the first call. Responses with relevant technologies will be evaluated during the next MPEG meeting in July Digital Rights Management Integration Different usage scenarios can be set up using MIPAMS, our proposed architecture. In the next subsections, we describe a reduced set that we consider relevant according to present needs of content creators, distributors and consumers. For some of the scenarios, we also present some research and development projects where we have implemented the proposed functionalities using MIPAMS services and modules. We also include some screenshots of the final user applications and portals that have been implemented. 4.1 Content registration, protection, search, licensing and access control This scenario covers the full system functionality, including content registration and protection, offers publication, content search, purchase and licensing, authorization and access. In this case, we first need an interface for content creators to register and publish their content and determine and modify their offers. This functionality is provided by means of specific user applications for editing or otherwise integrated in a web portal. In this scenario, once content is registered, it can be linked from external sites so as to be able to license it through the mentioned portal, which means that the content promoted in external sites can include specific links towards the licensing portal. Moreover, apart from being linked from other sites, the portal itself would also be useful for promotion. Fig. 2 shows a screenshot of the portal, where content is being rendered. This scenario has been implemented in Musiteca [18], a research project funded by the Spanish Administration. In this project, we have used some of the services conforming MIPAMS (LS, RS, ATS, CS, ORS, SS and CA) to implement a content creation platform. The access to the Musiteca repository is done through a portal that permits the registration of content, the purchase of content (licensing) and the access to the content purchased after the user is authorized. The actions performed by the different users of the system are registered using the reporting functionality provided by RS.

6 6 Fig. 2 Protected rendering in a specific DRM portal in Musiteca. 4.2 Content registration and licensing This scenario just involves content licensing and registration. It is applicable to those cases where there are well established sites that deal with the promotion and collection of content, but for which licensing is not a part of their business model (e.g. Flickr, Picassa, Panoramio, Youtube, etc.). Although content can be directly accessed from those sites, it may be distributed under some restrictions that do not enable users to use it for free. This is the case when content is distributed e.g. under copyright ( all rights reserved ) or Creative Commons Non-Commercial models [19]. In this scenario, the DRM architecture would act as a trading portal, devised for formalizing the rights acquisition for personal or professional usage. Content owners or rights holders are responsible for registering content in the trading portal and providing the link towards it. As in the previous scenario, content can be linked from external sites. Figure 3 shows how content is linked from an external site, the Musiteca Freebase database [20], which holds information about musical content in the Musiteca project.

7 7 Fig. 3 Licensing link from Freebase to a specific DRM portal in Musiteca. 4.3 Content registration, licensing and access control without protection This scenario extends the previous one by adding the access to content after the license purchase, which would be authorization-based but giving the unprotected content to the purchasing user so that they can enjoy it without further DRM restrictions. This scenario has been implemented in the Intellectual Property Operations System (IPOS) [21], a Content Management System (CMS) resulting from several software developments done by DMAG under different contracts with NetPortedItems [22], a Spanish SME company. This CMS provides content authors the possibility of registering their work into the CMS. An author may even describe how other authors can use their work for deriving new content. This information is described using LS licenses, where we have added a special condition called Rights over Derivatives (ROD) [23][24]. This condition indicates the percentage of the income that someone gets from a derivative work that is required to return to the original author. When an author creates derived content from an existing work and gets any revenue from it, the CMS follows back the chain of works, calculates the money for each author from the ROD condition and creates a report for

8 8 each author informing of this fact. Reports can be consulted at established time periods to give each author the corresponding revenues. This system makes use of all MIPAMS services through a dedicated portal. Fig. 4 Content access and unprotected rendering in IPOS. 4.4 Content registration, search, licensing and access control without content management This scenario is devised for content providers or distributors that want to use their specific protection mechanisms and content management systems so that content does never leave their well-established systems. In such scenario, when registering content in the Object Registration, specific proprietary identifiers are used for identifying external content. Once objects are registered, rights offers can be published and licenses issued without any technical restriction. Regarding the applications that access content, such as players and editors, content providers or distributors will have to design their own applications to manage the access to encryption keys and content from their systems or otherwise provide an API so that their content can be accessed from third-party applications. This scenario has been implemented in CulturaLive [25], a research project funded by Catalan Administration. In this project, we have integrated, using Web s, MIPAMS LS, AS and RS into an existing system offered by another project partner [26] that provides audiovisual content to be broadcasted live by televisions participating in the project through Digital Terrestrial Television (DTT). With our modules, content purchases can be tracked, as we register each license acquisition and authorization result (positive or negative) into a reporting database. This database can be later consulted for billing purposes. It is worth noting that digital content to be broadcasted is not managed by MIPAMS but directly

9 9 by the different TV s and SME s forming part of the project. This gives an idea of the integration capabilities of the MIPAMS platform. 4.5 Content registration, protection, search, licensing and access control for limited capabilities devices This scenario involves limited capabilities devices. In some cases, the encryption strength being used should be limited so as not to be detrimental to the devices performance. In such cases, if content is already registered and protected using non-compatible protection mechanisms, the intermediary could be responsible for decrypting content and reencrypting it to deal with the devices limitations. Otherwise, if content is only to be used by limited capabilities devices, it should be encrypted using the suitable protection mechanism when uploaded to the CS. This scenario has been also implemented in some projects of our research group (for instance, AXMEDIS [27] but there were also other projects), but in a slightly different way. In such projects, the modules involved in the authorization of user actions were located inside the mobile device. In this way, when the user wanted to consume some content, the license for authorizing this action was inside the mobile. This was done to avoid calling external services, as it involved a phone call or data transaction that may involve a non-negligible cost for the user. Moreover, mobile devices used a proprietary licensing schema (OMA DRM [28]) addressed to devices with limited processing and communication capabilities. Currently, since smartphones and high capacity mobile devices are gaining relevance and current telecommunications companies are adopting competitive pricing policies for mobile users (e.g. flat fees), the solutions being implemented might be reconsidered. 4.6 Content registration and licensing through external services The last proposed scenario is based on the usage of registration functionalities, leaving content licensing for being tackled by external sites or services. In this scenario, the MIPAMS architecture would act as a mere intellectual property registry, proving content ownership and offering the possibility to link content with external sites that deal with its commercialization, as it may be the case of YouLicense [29], Getty Images [30], etc. Figure 5 shows how it could work in the Musiteca [18] project. Content would be registered and accessible for being searched, while the shopping chart icon would redirect the user to a specialized and external licensing service.

10 10 Fig. 5 Link to external sites for licensing content 5. MIPAMS compared to MXM and AIT In this section we analyze the three initiatives dealing with distributed multimedia applications development considered in this paper: MIPAMS, MXM and AIT. We are not going to compare or map them, but to justify how we have implemented MIPAMS in this way and not considered some of the modules and protocols defined in MXM and AIT. We describe these considerations in the next subsections. However, it must be noted that the first implementations of MIPAMS were made before the start of work on MXM and AIT [31]. 5.1 MIPAMS compared to MXM The relationship between MIPAMS and MXM is mainly related with some of the protocols defined by MXM. In fact, some MIPAMS services (ORS, CS, RS and LS) follow and implement the concepts behind MXM protocols related with Content, Licenses and Event Reports. MIPAMS also implements part of the engines (Digital Item Engine, REL Engine, etc.), but it does not implement any functionality for modifying digital resources (image, video, audio, graphic, etc.) as it works at a higher abstraction level, the one described by MPEG-21. As digital resource operations are not implemented, Digital Item Adaptation operations considered in MXM have been discarded in current version of MIPAMS. In previous versions of our architecture we considered MPEG-21 Digital Item Adaptation [32] operations implementations but they only applied to the inclusion of MPEG-21 DIA expressions into MPEG-21 REL [7] licenses for authorizing complex digital resource adaptations for its rendering in limited capabilities devices (usually mobile devices) [33]. The Content Search and Security Engines described by MXM

11 11 are also considered into MIPAMS Search and Protection, respectively. Regarding MPEG-21 Media Value Chain Ontology (MVCO) [34], we are implementing an authorization engine based on this ontology to be integrated in MIPAMS. The authorization engine used, REL based or MVCO based, will only depend on the needs of the final user application making use of MIPAMS. To sum up, MIPAMS implements most of the engines and protocols described in MXM, although we have used a different approach in some cases. Regarding the functionality defined in MXM that is not part of MIPAMS, we are going to implement MVCO based authorizer, but we do not plan to include low level resource (audio, images, etc.) operations for the moment. 5.2 MIPAMS compared to AIT Although, as already mentioned, AIT is still in a very early stage of development, we are already in a position to compare it with MIPAMS. There is a close relationship between MIPAMS and AIT, as MIPAMS already implements several services described as AIT Elementary s in [2], especially those related to content, licenses and event reports. MIPAMS also implements several services related to users and services, mainly the ones related to authentication and authorization. Regarding contracts, we do not implement any functionality inside MIPAMS current version, but we have some background on this area developed during the AXMEDIS project, where we analyzed several contracts from partners related to the audiovisual environment and we implemented an application for transforming textual contracts into MPEG-21 REL licenses. Our experience in this field has been reflected into a contribution to the AIT first call for proposals for the elementary services related to contracts [35]. We are working on a new version of this contribution as a new call for proposals has been issued for the next MPEG meeting [17]. On the other hand, MIPAMS does not include the implementation of the AIT elementary services related to devices, since this functionality is not required in the presented scenarios. In other contexts, we have defined and implemented operations over devices in projects like AXMEDIS (as described in section 4.5), but we decided not to include them on MIPAMS as they finally depend on the final user application (or in the intermediary) or they may change from application to application and need to be implemented according to the application requirements. Nevertheless, we are considering the specification of AIT devices functionality in a specific new module or as an extension of the ATS service. Finally, regarding services related to groups, in the IPOS project we have implemented grouping functionality in order to permit users to act as a single unit, while being flexible enough to support different shares. This specific part of IPOS

12 12 can be easily integrated into the MIPAMS architecture by extending the authentication service, whenever it is needed. 6. Conclusions In this paper, we have presented three initiatives that deal with the development of distributed multimedia applications and Digital Rights Management technologies. In this context, we have proposed several relevant usage scenarios that share some common functionality such as content registration, protection, search, licensing and access control. We have also presented some sample implementations done by the DMAG in different research projects and we have proved how the aforementioned functionality can be integrated into a single generic architecture called MIPAMS, which offers distributed services and enables to build specific applications on top of it, that depend on the business model being followed. Finally, we have compared our platform with the MXM and AIT standards, identifying why we are not strictly following them. We plan to continue contributing from our developments to the standards in progress and adopt new standards specifications when possible, to facilitate interoperability. Furthermore, we are progressing in the development and exploitation of the architecture and applications on top of it. 7. Acknowledgements Part of this work has been supported by the Spanish administration: Multimedia Content Management Life Cycle (MCM-LC) project (TEC C02-01), Musiteca project (TSI ); by the European Commission: AXMEDIS (IST ); by the Catalan administration: CulturaLive; and by the company NetPortedItems, S.L.: IPOS. 8. References [1] ISO/IEC (2010) MPEG Extensible Middleware, [2] ISO/IEC (2010) ISO/IEC JTC 1/SC 29/WG 11 N11230, Context and Objectives for Advanced IPTV Terminal (AIT), Kyoto, Japan [3] Distributed Multimedia Applications Group (DMAG) (2010) [4] Torres V, Delgado J, Llorente S (2006) An Implementation of a Trusted and Secure DRM Architecture. Lecture Notes in Computer Science Springer, Heidelberg

13 [5] Delgado J, Rodríguez E (2008) Digital Rights Management Technologies and Standards. In: Ng K and Nesi P (eds) Interactive Multimedia Music Technologies. Information Science Reference, New York [6] ISO/IEC (2005) ISO/IEC IS 21000:2 Part 2: Digital Item Declaration [7] ISO/IEC (2004) ISO/IEC IS 21000:5 Part 5: Rights Expression Language [8] ISO/IEC (2006) ISO/IEC IS 21000:4 Part 4: Intellectual Property Management and Protection Components [9] ISO/IEC (2006) ISO/IEC IS 21000:15 Part 15: Event Reporting [10] OASIS (2005) Security Assertion Markup Language (SAML) [11] Rodríguez V, Delgado J, Chiariglione F et al (2010) Interoperable Digital Rights Management based on the MPEG Extensible Middleware, Multimedia Tools and Applications. Ed. Springer Netherlands [12] ISO/IEC (2010) ISO/IEC : Information technology - MPEG-M (MPEG Extensible Middleware) - Part 1: MXM architecture and technologies. Final Committee Draft [13] ISO/IEC (2010) ISO/IEC : Information technology - MPEG-M (MPEG Extensible Middleware) - Part 2: MXM API. Final Committee Draft [14] ISO/IEC (2010) ISO/IEC : Information technology - MPEG-M (MPEG Extensible Middleware) - Part 3: MXM Reference software. Final Committee Draft [15] ISO/IEC (2010) ISO/IEC : Information technology - MPEG-M (MPEG Extensible Middleware) - Part 4: MXM protocols. Final Committee Draft [16] ISO/IEC (2010) ISO/IEC JTC 1/SC 29/WG 11 N11228, Requirements for Advanced IPTV Terminal (AIT), Kyoto, Japan [17] ISO/IEC (2010) ISO/IEC JTC 1/SC 29/WG11 N11336, Advanced IPTV Terminal (AIT): 2nd Call for Proposals, Dresden, Germany [18] Musiteca research Project (TSI ) (2008) Ministerio de Industria, Turismo y Comercio (Subprograma Avanza I+D) [19] Creative Commons licenses (2010) [20] Musiteca Freebase database (2010) [21] Intellectual Property Operations System (IPOS) (2010) [22] NetPortedItems S.L.(2010) [23] Torres V, Delgado J, Maroñas X, Llorente S, Gauvin M (2009) A web-based rights management system for developing trusted value networks. Proc. of the 18th International World Wide Web Conference Developer s Track [24]Torres V, Delgado J, Maroñas X, Llorente S, Gauvin M (2009) Enhancing rights management systems through the development of trusted value networks. Proc. of the 7th International Workshop on Security in Information Systems [25] CulturaLive research Project (2009REGIÓ 00024) (2009) Generalitat de Catalunya [26] Video Stream Networks (VSN) (2010) [27] AXMEDIS (IST ) ( ) Automating Production of Cross Media Content for Multi-channel Distribution, European Commission [28] Open Mobile Alliance Digital Rights Management (OMA DRM) (2010) [29] YouLicense (2010) [30] Getty Images (2010) [31] Torres V, Rodríguez E, Llorente S, Delgado J (2004) Architecture and Protocols for the Protection and Management of Multimedia Information. Lecture Notes in Computer Science Springer, Heidelberg [32] ISO/IEC (2007) ISO/IEC IS 21000:7 Part 7: Digital Item Adaptation [33] Llorente S, Delgado J, Maroñas X (2007) Implementing Mobile DRM with MPEG-21 and OMA Proc of the 5th International Workshop on Security in Information Systems [34] ISO/IEC (2010) ISO/IEC IS 21000:19 Part 19: Media Value Chain Ontology [35] Rodríguez V, Delgado J, Rodríguez E, Llorente S (2010) ISO/IEC JTC1/SC29/WG11 MPEG2010/M17561 DMAG-UPC Response to the AIT Call, Dresden, Germany 13

Workflow description of digital rights management systems

Workflow description of digital rights management systems Workflow description of digital rights management systems Silvia Llorente, Eva Rodríguez and Jaime Delgado Universitat Pompeu Fabra (UPF), Departament de Tecnologia, Pg. Circumval lació 8, E-08003 Barcelona,

More information

1 Introduction. 2 Background

1 Introduction. 2 Background Source Title Status Authors DMAG-UPC (A member of HL7 Spain) DMAG contribution to the HL7 Security and Privacy Ontology Input Contribution Jaime Delgado (jaime.delgado@ac.upc.edu) Eva Rodríguez (evar@ac.upc.edu)

More information

How To Create A Multi-Party Content Management System (Mmv21)

How To Create A Multi-Party Content Management System (Mmv21) Universitat Politècnica de Catalunya Department of Computer Architecture Ph.D. Dissertation Rights and Services Interoperability for Multimedia Content Management Author: Xavier Maroñas Borras Advisor:

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Intellectual Property Management and Protection in MPEG Standards

Intellectual Property Management and Protection in MPEG Standards Intellectual Property Management and Protection in MPEG Standards Rob Koenen Chairman MPEG Requirements Group (rob@intertrust.com) 1 Abstract MPEG has a long history in dealing with DRM issues. Gradually,

More information

How To Protect Your Privacy In An Online Social Network

How To Protect Your Privacy In An Online Social Network A Digital Rights Management approach to privacy in online social networks Eva Rodríguez, Víctor Rodríguez, Anna Carreras, Jaime Delgado Universitat Politècnica de Catalunya (UPC) Jordi Girona 1-3, E-08034

More information

HbbTV Forum Nederland Specification for use of HbbTV in the Netherlands

HbbTV Forum Nederland Specification for use of HbbTV in the Netherlands HbbTV Forum Nederland Specification for use of HbbTV in the Netherlands Version 1.0 Approved for Publication 2013, HbbTV Forum Nederland Date: 1 May 2013 Contact: Rob Koenen, rob.koenen@tno.nl Specification

More information

M3039 MPEG 97/ January 1998

M3039 MPEG 97/ January 1998 INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039

More information

DASH-IF Implementation Guidelines: Content Protection Information Exchange Format (CPIX)

DASH-IF Implementation Guidelines: Content Protection Information Exchange Format (CPIX) DASH-IF Implementation Guidelines: Content Protection Information Exchange Format (CPIX) July 17, 2015 DASH Industry Forum Version 1.0 Scope The scope of this document is to define a Content Protection

More information

Digital Rights Management

Digital Rights Management The term Digital Rights Management - DRM - has its origins in the combined efforts of some vendors, their marketing staff and some other industry analysts in the late 1990s [1]. It is a breakthrough in

More information

CONVERGENCE Glossary (version of 30/10/2012)

CONVERGENCE Glossary (version of 30/10/2012) Glossary (version of 30/10/2012) Term Access Rights Advertise Application Business Scenario CA CCN Cl_Auth_SC Cl_Auth_User_Pw Clean-slate architecture CoApp CoApp Provider CoMid CoMid Provider CoMid Resource

More information

Title: Interim Study Period Report on Metadata for the Cloud Computing

Title: Interim Study Period Report on Metadata for the Cloud Computing ISO/IEC JTC1/SC32 Data Management & Interchange WG2 Metadata Title: Interim Study Period Report on Metadata for the Cloud Computing Version : 1.5 Date of version : May 2012 Authors : Baba Piprani CA Ewelina

More information

Advanced Meta-search of News in the Web

Advanced Meta-search of News in the Web Advanced Meta-search of News in the Web Rubén Tous, Jaime Delgado Universitat Pompeu Fabra (UPF), Departament de Tecnologia, Pg. Circumval lació, 8. E-08003 Barcelona, Spain {ruben.tous, Jaime.delgado}@tecn.upf.es

More information

Network-based Access Control

Network-based Access Control Chapter 4 Network-based Access Control 4.1 Rationale and Motivation Over the past couple of years, a multitude of authentication and access control technologies have been designed and implemented. Although

More information

A refined architecture for DRM

A refined architecture for DRM A refined architecture for DRM Koen Buyens Sam Michiels Wouter Joosen Report CW 450, June 2006 nkatholieke Universiteit Leuven Department of Computer Science Celestijnenlaan 200A B-3001 Heverlee (Belgium)

More information

SYSTEM DEVELOPMENT AND IMPLEMENTATION

SYSTEM DEVELOPMENT AND IMPLEMENTATION CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design

More information

Content management and protection using Trusted Computing and MPEG-21 technologies

Content management and protection using Trusted Computing and MPEG-21 technologies Technische Universität München Lehrstuhl für Datenverarbeitung Univ.-Prof. Dr.-Ing. K. Diepold Content management and protection using Trusted Computing and MPEG-21 technologies Florian Schreiner Vollständiger

More information

Digital Rights Management - The Difference Between DPM and CM

Digital Rights Management - The Difference Between DPM and CM WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA info@iprsystems.com http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Digital Rights Management for the Online Music Business

Digital Rights Management for the Online Music Business Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

Chillout - the Open Source DRM Software. Filippo Chiariglione CEDEO.net Yuqiang Liao Joint Digital Laboratory China

Chillout - the Open Source DRM Software. Filippo Chiariglione CEDEO.net Yuqiang Liao Joint Digital Laboratory China Chillout - the Open Source DRM Software Filippo Chiariglione CEDEO.net Yuqiang Liao Joint Digital Laboratory China 1 Abstract This paper presents Chillout [1], the Open Source DRM Software implementing

More information

A Software Architecture to Facilitate the creation of DRM Systems

A Software Architecture to Facilitate the creation of DRM Systems A Software Architecture to Facilitate the creation of DRM Systems Koen Buyens, Sam Michiels, and Wouter Joosen IBBT-DistriNet research group, Department of Computer Science, K.U.Leuven, Celestijnenlaan

More information

A Metadata Model for Peer-to-Peer Media Distribution

A Metadata Model for Peer-to-Peer Media Distribution A Metadata Model for Peer-to-Peer Media Distribution Christian Timmerer 1, Michael Eberhard 1, Michael Grafl 1, Keith Mitchell 2, Sam Dutton 3, and Hermann Hellwagner 1 1 Klagenfurt University, Multimedia

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information

OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL

OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL Frédéric Dufaux, Michael Ansorge, and Touradj Ebrahimi Institut de Traitement des Signaux Ecole Polytechnique Fédérale de Lausanne (EPFL)

More information

WebLogic Server 7.0 Single Sign-On: An Overview

WebLogic Server 7.0 Single Sign-On: An Overview WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of

More information

ATSC Standard: ATSC Security and Service Protection Standard

ATSC Standard: ATSC Security and Service Protection Standard ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television

More information

Adaptive User Interface Modeling Design for Webbased Terminal Middleware

Adaptive User Interface Modeling Design for Webbased Terminal Middleware Adaptive User Interface Modeling Design for Webbased Terminal Middleware Sunghan Kim and Seungyun Lee Standard Research Center, ETRI, Daejeon, Korea {sh-kim, syl}@etri.re.kr Abstract. This paper shows

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at TFS.EAO@gsa.gov 1 Table of Contents 1.

More information

Dr. Pat Mirenda. Software Design Specification Document

Dr. Pat Mirenda. Software Design Specification Document CPSC 319 Team 2 Dr. Pat Mirenda Software Design Specification Document Version: 1.2 Date: (03/17/2006) 2Communicate SDS Revisions Version Primary Author(s) Description of Version Date Completed 1.0 Wei

More information

Collaborative editing using an XML protocol

Collaborative editing using an XML protocol University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Collaborative editing using an XML protocol S. J. Davis University

More information

Introduction of Fujitsu DRM Solution for Marlin DRM/MPEG-DASH Solutions

Introduction of Fujitsu DRM Solution for Marlin DRM/MPEG-DASH Solutions Introduction of Fujitsu DRM Solution for Marlin DRM/MPEG-DASH Solutions March, 2013 FUJITSU LIMITED Introduction Fujitsu was dealing with the creating open specification of DRM from about 20 years ago.

More information

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security International Telecommunication Union ITU-T Y.2723 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2013) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Designing Ubiquitous Personalized TV-Anytime Services

Designing Ubiquitous Personalized TV-Anytime Services Designing Ubiquitous Personalized TV-Anytime Services Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Pappas, Anastasia Karanastasi, Stavros Christodoulakis Lab. Of Distributed Multimedia Information Systems

More information

Multimedia Environment for Technology Enhanced Music Education and Composition and Performance

Multimedia Environment for Technology Enhanced Music Education and Composition and Performance I-MAESTRO: Interactive Multimedia Environment for Technology Enhanced Music Education and Creative Collaborative C Composition and Performance www.i-maestro.net, www.i-maestro.org Kia Ng, ICSRiM - University

More information

TIB 2.0 Administration Functions Overview

TIB 2.0 Administration Functions Overview TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR

More information

Trends of Interactive TV & Triple Play

Trends of Interactive TV & Triple Play Trends of Interactive TV & Triple Play 1 Technology trends 4C s convergence Improvement and standardization of the encoding technology The enhancement and cost effective of IP video streaming network components

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Potential standardization items for the cloud computing in SC32

Potential standardization items for the cloud computing in SC32 WG2 N1665 Potential standardization items for the cloud computing in SC32 ISO/IEC JTC 1/SC 32 Plenary Meeting, Berlin, Germany, June 2012 Sungjoon Lim, Korea Database Agency (KDB) Dongwon Jeong, Kunsan

More information

VRNET II NoE: Marketplace Model and Implementation

VRNET II NoE: Marketplace Model and Implementation CONTEXTUAL INFORMATION IN VIRTUAL COLLABORATION SYSTEMS BEYOND CURRENT STANDARDS Anna Carreras 1, Maria Teresa Andrade 2, Tim Masterton 3, Hemantha Kodikara Arachchi 4, Vitor Barbosa 2, Safak Dogan 4,

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Last updated April 2015

DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Last updated April 2015 DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Last updated April 2015 DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Digital media continues to grow exponentially in Canada. Multichannel video content delivery

More information

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

EUR-Lex 2012 Data Extraction using Web Services

EUR-Lex 2012 Data Extraction using Web Services DOCUMENT HISTORY DOCUMENT HISTORY Version Release Date Description 0.01 24/01/2013 Initial draft 0.02 01/02/2013 Review 1.00 07/08/2013 Version 1.00 -v1.00.doc Page 2 of 17 TABLE OF CONTENTS 1 Introduction...

More information

Hybrid for SharePoint Server 2013. Search Reference Architecture

Hybrid for SharePoint Server 2013. Search Reference Architecture Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including

More information

Federated Portals. Subbu Allamaraju Staff Engineer BEA Systems Inc

Federated Portals. Subbu Allamaraju Staff Engineer BEA Systems Inc Federated Portals Subbu Allamaraju Staff Engineer BEA Systems Inc Agenda Federated portals and SOA Federated portals internals Best practices Upcoming features Q&A (C) Copyright 2005, BEA Systems, Inc

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols International Telecommunication Union ITU-T X.1154 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2013) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Digital Rights Management (DRM) in Education - The Need for Standardisation

Digital Rights Management (DRM) in Education - The Need for Standardisation Digital Rights Management (DRM) in Education - The Need for Standardisation A Briefing Paper for IMS Neil Mclean, IMS Australia Centre Renato Iannella, IPR Systems February 2002 Version 1.0 1 Overview

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace

More information

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014 Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006 /30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:

More information

The best of both worlds

The best of both worlds Feature Open source strategies The best of both worlds Mixing open source and closed software can prove to be an effective and profitable corporate strategy. Philips is one company that has come to understand

More information

A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES

A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES Sasithorn Rattanarungrot, Martin White and Paul Newbury University of Sussex ABSTRACT

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

high-quality surround sound at stereo bit-rates

high-quality surround sound at stereo bit-rates FRAUNHOFER Institute For integrated circuits IIS MPEG Surround high-quality surround sound at stereo bit-rates Benefits exciting new next generation services MPEG Surround enables new services such as

More information

STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA)

STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA) Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report STANDARDS FOR AGENTS AND AGENT

More information

BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY

BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY 1 2 BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY 1 Carmen RĂDUŢ, 2 Maria STĂNILOIU 1 Universitatea Constantin Brâncoveanu PITEŞTI 2 Universitatea

More information

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SILVERLIGHT 5 These license terms are an agreement between Microsoft Corporation (or based on where you

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SILVERLIGHT 5 These license terms are an agreement between Microsoft Corporation (or based on where you MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SILVERLIGHT 5 These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them.

More information

A Semantic Approach for Access Control in Web Services

A Semantic Approach for Access Control in Web Services A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

CryptoNET: Security Management Protocols

CryptoNET: Security Management Protocols CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,

More information

SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Communication procedures

SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Communication procedures I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Technical Paper (11 July 2014) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure

More information

Towards an Expression Language for Licensing Content in the Connected Semantic Web

Towards an Expression Language for Licensing Content in the Connected Semantic Web Towards an Expression Language for Licensing Content in the Connected Semantic Web Victor Rodriguez-Doncel 1, Jaime Delgado 1 1 DMAG, Universitat Politècnica de Catalunya, Barcelona, Spain {victorr, jaime.delgado}@ac.upc.edu

More information

My Stuff Everywhere Your Content On Any Screen

My Stuff Everywhere Your Content On Any Screen Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple

More information

How to Increase the Security of Digital Rights Management Systems without Affecting Consumer s Security

How to Increase the Security of Digital Rights Management Systems without Affecting Consumer s Security How to Increase the Security of Digital Rights Management Systems without Affecting Consumer s Security 4FriendsOnly.com Internet Technologies AG PD Dr.-Ing. habil. Jürgen Nützel, CEO, JN@4FO.de 4FriendsOnly.com

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

UCO On Demand Usage Guidelines

UCO On Demand Usage Guidelines UCO On Demand Usage Guidelines Purpose UCO On Demand is a media management and content delivery system, hosted by Kaltura, for higher education that provides a means for managing, delivering, creating,

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Mobile TV with DVB-H. Markus Lindqvist Director, Server & Network Solutions Multimedia, Nokia. 1 2005 Nokia Nseries

Mobile TV with DVB-H. Markus Lindqvist Director, Server & Network Solutions Multimedia, Nokia. 1 2005 Nokia Nseries Mobile TV with DVB-H Markus Lindqvist Director, Server & Network Solutions Multimedia, Nokia 1 2005 Nokia Nseries MobileTV & Video User Paradigms Multiple ways to receive, download and play TV and video

More information

MART-MAF: Media file format for AR tour guide service

MART-MAF: Media file format for AR tour guide service MART-MAF: Media file format for AR tour guide service The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher

More information

CBIO Security White Paper

CBIO Security White Paper One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s

More information

How good Mobile TV needs to be?

How good Mobile TV needs to be? How good Mobile TV needs to be? Raquel Navarro-Prieto Fundació Barcelona Media- Universitat Pompeu Fabra Ocata 1, 08003 Barcelona, Spain Raquel.Navarro@barcelonamedia.org Abstract Converged technologies

More information

Legal Compliance Education and Awareness. Copyright Act 1968. Communicating Electronic Material. (Commonwealth) Life Impact The University of Adelaide

Legal Compliance Education and Awareness. Copyright Act 1968. Communicating Electronic Material. (Commonwealth) Life Impact The University of Adelaide Legal Compliance Education and Awareness Copyright Act 1968 Communicating Electronic Material (Commonwealth) Life Impact The University of Adelaide Online Distribution of Teaching Materials Technology

More information

Mobile TV: The time to act is now

Mobile TV: The time to act is now SPEECH/07/154 Viviane Reding Member of the European Commission responsible for Information Society and Media Mobile TV: The time to act is now Mobile TV Conference, International CeBIT Summit Hannover,

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Why a single source for assets should be. the backbone of all your digital activities

Why a single source for assets should be. the backbone of all your digital activities Why a single source for assets should be the backbone of all your digital activities Navigating in the digital landscape The old era of traditional marketing has long passed. Today, customers expect to

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Integration of Learning Management Systems with Social Networking Platforms

Integration of Learning Management Systems with Social Networking Platforms Integration of Learning Management Systems with Social Networking Platforms E-learning in a Facebook supported environment Jernej Rožac 1, Matevž Pogačnik 2, Andrej Kos 3 Faculty of Electrical engineering

More information

Cite My Data M2M Service Technical Description

Cite My Data M2M Service Technical Description Cite My Data M2M Service Technical Description 1 Introduction... 2 2 How Does it Work?... 2 2.1 Integration with the Global DOI System... 2 2.2 Minting DOIs... 2 2.3 DOI Resolution... 3 3 Cite My Data

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

Use Cases for the Business Transaction Protocol

Use Cases for the Business Transaction Protocol Use Cases for the Business Transaction Protocol OASIS Business Transactions Technical Committee Models/Use Cases Technical Subcommittee bt-models@lists.oasis-open.org Introduction This document attempts

More information

Programming SIP Services University Infoline Service

Programming SIP Services University Infoline Service Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now

More information

Electronic Rights Enforcement for Learning Media

Electronic Rights Enforcement for Learning Media Electronic Rights Enforcement for Learning Media Susanne Guth Department of IS-New Media Lab Vienna University of Economics and Business Administration, Austria Phone: +43 (1) 31336 4427 susanne.guth@wu-wien.ac.at

More information

Digital Rights Management & XML Security Protocols

Digital Rights Management & XML Security Protocols Digital Rights Management & ML Security Protocols Head-to-Head or Hand-in-Hand? Holly Lynne McKinley, SSCP Booz Allen Hamilton McLean, VA Introduction Digital Rights Management brings to mind controversial

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

C033 Certification Report

C033 Certification Report C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: mycc@cybersecurity.my

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

Pastiche. Bring training content to your learners tablets PASTICHE DATA SHEET. Product Highlights

Pastiche. Bring training content to your learners tablets PASTICHE DATA SHEET. Product Highlights Pastiche is an end-to-end solution from content import and authoring to consumption on your custom branded app. Deploy your app in as little as 30-60 days, ensuring you the fastest go-to-market in a highly

More information