• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 13
  • 8
  • 7
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 97
  • 28
  • 26
  • 21
  • 13
  • 12
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Investigação sobre o estabelecimento de falsas memórias por meio do paradigma da equivalência de estímulos / Investigations on the establishment of false memories through stimulus equivalence paradigm

Aggio, Natalia Maria 18 August 2014 (has links)
Made available in DSpace on 2016-06-02T20:30:09Z (GMT). No. of bitstreams: 1 6278.pdf: 3722087 bytes, checksum: 5d4fe7ef1accdc79a886f6fa9eec0aff (MD5) Previous issue date: 2014-08-18 / Universidade Federal de Minas Gerais / False memories are defined as remembering events that never happened or remember facts in a distorted way. In cognitive psychology this phenomenon has been studied through the Deese-Roediger-McDermott (DRM) paradigm, in witch lists of words semanticaly related are used. In behavior analysis, the paradigm of stimulus equivalence is a proposition to study semantic relations. This doctoral dissertation presents three studies with undergraduate students in witch DRM and the stimulus equivalence paradigms were used in association to investigate false memories. First and second studies aimed to replicate the phenomenon in a experimental situations, using both Paradigms. Difference concentrates in the controlled variables. In Study 1, nonsense words were used as stimuli. Procedure was divided into two phases. Phase 1: formation of three twelve members equivalence classes. Phase 2: verification of false memories using lists based on DRM paradigm. A list with 10 out of the 12 stimuli from each of the three classes was presented (study list). After completing a distracter task a lists composed by all stimuli from previously list (targets), the rest of the stimuli form the classes (critical distractors) and four more nonsense words (non-related distracters) were shown. Participants should indicate witch stimuli were presented on study list. Participant recognized significantly more critical distratctors, compared to non-related stimuli. However, results could be due to the novelty of non-related distractors. In the second study, this variable was controlled. In Study 2, bot phases were presented, but in Phase 1, participants were first taught three four-stimuli equivalence classes in witch one set of stimuli was familiar pictures. Later, three classes with twelve stimuli were taught. Stimuli from the first three classes were used as non-related distractors. Participant did not recognized significantly more critical distratctors, compared to non-related. It is argued that results could be due to a weak relations between stimuli from the equivalence classes. The third study aimed to increase the relations between stimuli and to investigate the effect of including emotional stimuli in equivalence classes, on false memories. Study 2 was replicated and in the twelve-member classes, a set of stimuli was pictures with happiness, angry or neutrality expressions. Only in neutral list critical ditractors were recognized significantly more than non-related distractors. Results indicates list with emotions are less likely to produce false memories. / Falsas memórias são definidas como lembranças de eventos que nunca aconteceram ou lembranças distorcidas de fatos do passado. Na psicologia cognitiva, este fenômeno tem sido estudado por meio do paradigma Deese-Roediger-McDermott (DRM) que utiliza listas com palavras associadas semanticamente. Na análise do comportamento, existe a proposta do estudo de relações semânticas utilizando o paradigma da equivalência de estímulos. A presente tese apresenta três estudos que utilizaram o paradigma DRM e o de equivalência de estímulos no estudo de falsas memórias. O primeiro e o segundo estudos tiveram por objetivo replicar o fenômeno, em situação experimental, utilizando os dois paradigmas. A diferença esteve nas variáveis controladas em ambos os estudos. No Estudo 1 foram utilizadas apenas pseudopalavras como estímulos. O procedimento foi dividido em duas fases. Fase 1: treino para formação de três classes de equivalência compostas por 12 estímulos. Fase 2: teste de falsas memórias. Uma lista era apresentada com alguns dos estímulos das classes formadas na fase anterior (lista de estudo). Após um tarefa distratora, era apresentada uma lista composta por todos os estímulos da lista de estudo (alvos), o restante dos estímulos das classes, que não constavam na lista de estudo (distratores críticos) e mais quatro novos estímulos (distratores não relacionados). Os resultados mostraram reconhecimento significativamente maior dos distratores críticos do que dos não relacionados. Uma variável importante observada foi que os resultados poderiam ser fruto da novidade dos distratores críticos. No segundo estudo essa variável foi controlada. No Estudo 2, as duas fases também estiveram presentes, porém na Fase 1 foram ensinadas, primeiramente, três classes de equivalência com quatro estímulos, em que um dos conjuntos de estímulos era composto por figuras familiares. Em seguida, três classes com 12 estímulos foram ensinadas. Qs estímulos das primeiras classes foram utilizados como distratores não relacionados. Os resultados apontaram que não houve diferenças significativas no reconhecimento dos dois tipos de distratores. Argumenta-se que esse resultado possa ser fruto de um baixo grau de relacionamento entre os estímulos das classes de equivalência. O terceiro estudo pretendeu aumentar a força das relações de equivalência e verificar a influência da utilização de estímulos com conteúdos emocionais nas classes de equivalência na ocorrência de falsas memórias. O estudo 2 foi replicado e, para as classes com 12 estímulos, os estímulos de um dos conjuntos de cada classe eram ou expressões faciais de alegria, ou de raiva, ou de neutralidade. Apenas na lista neutra, os distratores críticos foram mais reconhecidos que os não relacionados. Os resultados indicam que listas com conteúdo emocional são menos sujeitas a falsas memórias.
32

Support consumers' rights in DRM : a secure and fair solution to digital license reselling over the Internet

Gaber, Tarek January 2012 (has links)
Consumers of digital contents are empowered with numerous technologies allowing them to produce perfect copies of these contents and distribute them around the world with little or no cost. To prevent illegal copying and distribution, a technology called Digital Rights Management (DRM) is developed. With this technology, consumers are allowed to access digital contents only if they have purchased the corresponding licenses from license issuers. The problem, however, is that those consumers are not allowed to resell their own licenses- a restriction that goes against the first-sale doctrine. Enabling a consumer to buy a digital license directly from another consumer and allowing the two consumers to fairly exchange the license for a payment are still an open issue in DRM research area. This thesis investigates existing security solutions for achieving digital license reselling and analyses their strengths and weaknesses. The thesis then proposes a novel Reselling Deal Signing (RDS) protocol to achieve fairness in a license reselling. The idea of the protocol is to integrate the features of the concurrent signature scheme with functionalities of a License Issuer (LI). The security properties of this protocol is informally analysed and then formally verified using ATL logic and the model checker MOCHA. To assess its performance, a prototype of the RDS protocol has been developed and a comparison with related protocols has been conducted. The thesis also introduces two novel digital tokens a Reselling Permission (RP) token and a Multiple Reselling Permission (MRP) token. The RP and MRP tokens are used to show whether a given license is single and multiple resalable, respectively. Moreover, the thesis proposes two novel methods supporting fair and secure digital license reselling. The first method is the Reselling Deal (RD) method which allows a license to be resold once. This method makes use of the existing distribution infrastructure, RP, License Revocation List (LRL), and three protocols: RDS protocol RD Activation (RDA) protocol, and RD Completion (RDC) protocol. The second method is a Multiple License Reselling (MLR) method enabling one license to be resold N times by N consumers. The thesis presents two variants of the MLR method: RRP-MR (Repeated RP-based Multi-Reselling) and HC-MR (Hash Chain-based Multi-Reselling). The RRP-MR method is designed such that a buyer can choose to either continue or stop a multi-reselling of a license. Like the RD method, the RRP-MR method makes use of RP, LI, LRL, and the RDS, RDA, and RDC protocols to achieve fair and secure reselling. The HC-MR method allows multiple resellings while keeping the overhead on LI at a minimum level and enable a buyer to check how many times a license can be further resold. To do so, the HC-MR utilises MRP and the hash chain cryptographic primitive along with LRL, LI and the RDS, RDA and RDC protocols. The analysis and the evaluation of these three methods have been conducted. While supporting the license reselling, the two methods are designed to prevent a reseller from (1) continuing using a resold license, (2) reselling a non-resalable license, and (3) reselling one license a unauthorised number of times. In addition, they enable content owners of resold contents to trace a buyer who has violated any of the usage rights of a license bought from a reseller. Moreover, the methods enable a buyer to verify whether a license he is about to buy is legitimate for re-sale. Furthermore, the two methods support market power where a reseller can maximise his profit and a buyer can minimise his cost in a reselling process. In comparison with related works, our solution does not make use of any trusted hardware device, thus it is more cost-effective, while satisfying the interests of both resellers and buyers, and protecting the content owner's rights.
33

La protection appropriée des mesures techniques en droit d'auteur.<br><em>NOTE : Ce travail a fait l'objet d'une publication par les éditions Larcier (<a href="http://edoc.bib.ucl.ac.be:61/ETD-db/collection/submitted/FUNDPetd-06142005-161304/unrestricted/site_FUNDP.pdf" target="_blank">aperçu</a>, informations pour <a href="http://editions.larcier.com/livre/?GCOI=28044100937170" target="_blank">acquérir l'ouvrage</a>).</em>

Dusollier, Séverine 12 May 2004 (has links)
L’environnement digital constitue certes une menace pour la protection du droit d'auteur mais il y apporte aussi son lot de réponses et d’outils nouveaux. Ont ainsi été développés de nombreux dispositifs techniques visant à protéger les œuvres numériques, en ligne ou non : films, musique, programmes d'ordinateur, peuvent désormais être dotés de mécanismes techniques gérant les droits de l’auteur ou contrôlant la copie, l’accès ou l’utilisation non autorisés de l’œuvre. Le droit vient au secours de ces mesures techniques de protection : les Traités OMPI de 1996, la directive européenne de 2001 sur le droit d'auteur dans la société de l'information, récemment suivis par le législateur belge, prévoient de sanctionner la neutralisation de tels dispositifs, ainsi que la fabrication et le commerce de moyens permettant ou facilitant un tel contournement. L’œuvre est donc désormais susceptible de bénéficier d’une triple couche de protection : elle est protégée par le droit d’auteur, protégée par la technique, elle-même protégée par la loi. Cet ouvrage analyse l’articulation entre ces trois couches de réservation de l’œuvre et examine dans quelle mesure cette multiplication de la protection modifie le droit d'auteur et l’étendue des prérogatives qu’il accorde à son titulaire. L’auteur répond ainsi aux principales critiques qui ont été adressées à ces mesures techniques et aux dispositions anti-contournement, critiques relatives à l’impossibilité de bénéficier des exceptions au droit d'auteur et notamment de la copie privée, ainsi qu’au contrôle de l’accès à l’œuvre permis par ces dispositifs. Première analyse approfondie de l’introduction des mesures techniques en droit d'auteur, l’ouvrage est également une réflexion d’ensemble sur l’étendue du droit d’auteur, des droits exclusifs d’exploitation aux exceptions et limitations de ces droits, réflexion qui se nourrit aux fondements philosophiques, sociologiques ou économiques de la propriété littéraire et artistique. Ces développements, qui donnent lieu à une analyse minutieuse et argumentée, permettent à l’auteur de plaider d’une part pour une limitation naturelle du pouvoir de l’auteur aux actes d’exploitation de l’œuvre, soit aux actes permettant une diffusion publique de l’œuvre, excluant ainsi les seuls actes d’accès ou d’utilisation finale de l’œuvre ; d’autre part, pour une préservation nécessaire des exceptions au droit d'auteur à l’encontre des mesures techniques ou de la protection légale de celles-ci.
34

Efeitos do tipo de item e do monitoramento da fonte na criação e persistência de falsas memórias

Alves, Cintia Marques 01 September 2006 (has links)
False memories (FM´s) occur when we remember the events that never happened in reality, situations at which we were not present, and places where we never been to or when we remember some event differently from what really happened. The main purpose of this work was to check the durability of individual s memory after a time span of one week and to check the influence of the source monitoring on the creation of FM´s. For this, it was used the Deese-Roediger-McDermott (DRM) paradigm, which consists of the presentation of twelve lists of fifteen associated words (targets) to an undisclosed one which is called the critical distractor or critical nonpresented word. The individuals were picked among 80 UFU Psychology undergraduates who volunteer to participate. They were divided in two groups: auditory and visual ones. This separation was due to the difference in the modality of lists presentation at study. All participants were asked to pay attention to the words and half of them were asked to do the source monitoring of the words, whether it is auditory or visually form. Following the presentation of the twelve lists, they solved simple arithmetic problems. At last, it was done an immediate recognition memory test which has seventy words: thirty six studied itens (targets), twelve related lures (critical distractors) and twenty two unrelated lures (new words which were not semantically associated to any of the ten lists previously presented to them). One week later, they came back to do the delayed recognition memory test. The test and the procedure were the same as for the immediate recognition memory test. In these recognition tests they had to choose between Yes or No for each word, whether they did or did not recognize the words from one of the lists and they were asked to identify the word s source: Auditory or Visually form. The results showed that false memories are created and can be kept until one week later, more than real memories. Visual modality was better to the correct recognition (targets) and further more, it was responsible for the smaller rate of false recognition. Instructions to the individuals improved the source monitoring for targets, but it did not cut down on the misattribution for the critical distractor. / Falsas memórias (FM´s) podem ser definidas como o fato de nos lembrarmos de eventos que não ocorreram na realidade, de situações as quais nunca presenciamos, de lugares onde nunca estivemos, ou então, de nos lembrarmos de algum evento de maneira um pouco distorcida do que realmente aconteceu. O objetivo geral deste trabalho foi verificar a durabilidade da memória dos sujeitos ao longo de uma semana, bem como verificar a influência do monitoramento da fonte na criação de falsas memórias. Para tanto, neste estudo foi usado o procedimento de Deese/ Roediger/ McDermott (DRM) que consiste de listas de palavras associadas. O instrumento utilizado foi composto de doze listas de quinze palavras associadas (alvos) a um tema central que recebe o nome de distrator crítico e não aparece na lista. Os participantes da pesquisa foram 80 universitários do curso de Psicologia da UFU que aceitaram voluntariamente participar do estudo. Eles foram divididos em dois grupos: auditivo e visual. Esta separação foi devida a diferença da modalidade de apresentação das palavras no estudo. Foi pedido a todos que prestassem atenção às palavras e para a metade da amostra de cada grupo, foi informado que deveriam fazer o monitoramento da fonte das palavras, via auditiva ou visual. Após a apresentação das doze listas, eles fizeram uma tarefa de distração com problemas simples de matemática. Ao final, foi feito um teste de reconhecimento imediato contendo setenta palavras, sendo: trinta e seis alvos, os doze distratores críticos e vinte e duas palavras acrescentadas e que não eram semanticamente relacionadas a nenhuma das listas. Após uma semana, fizeram um teste de reconhecimento posterior, no qual receberam a mesma folha do teste de reconhecimento imediato e procederam da mesma forma. Nos testes de reconhecimento, eles tinham que assinalar a opção (Sim ou Não) em cada palavra, conforme reconhecessem ou não a palavra de alguma das listas e identificar a fonte na qual a palavra foi apresentada: auditiva ou visual. Os resultados mostraram que as falsas memórias são criadas e podem ser mantidas, após uma semana, mais do que as memórias reais. A modalidade visual foi melhor para o reconhecimento verdadeiro e foi a responsável pela menor taxa de reconhecimento falso. A instrução aos participantes melhorou o monitoramento da fonte para os alvos, mas não fez com que o índice de atribuição de fontes para os distratores críticos diminuísse. / Mestre em Psicologia Aplicada
35

Forecasting ridership impacts of transit oriented development at MARTA rail stations

Maier, George 07 January 2016 (has links)
The Metropolitan Atlanta Rapid Transit Authority (MARTA) Transit Oriented Development (TOD) program has been expanding the number of stations being considered for development of surface parking lots and into the air rights over certain rail stations. As of 2015, MARTA has six rail stations in various stages of TOD development, which will increase multi-modal options for metro Atlanta residents. The overarching goal of TOD development is to increase transit ridership and reduce auto-dependency; hence quantifying the potential benefits of TOD development in terms of ridership is paramount. Despite several drawbacks, travel demand models have historically been utilized to forecast ridership for land use changes and transit improvements. Direct ridership models (DRMs) are transit demand forecasting methods that can be applied to land development in cases where traditional travel demand models (TDMs) are not well suited. DRMs leverage geographic tools commonly used by planners to take advantage of small scale pedestrian environment factors immediately surrounding transit stations. Although DRM data and methods can achieve greater precision in predicting local walk-access transit trips, the lack of regional and large-scale datasets reduces the ability to model ridership generated from riders outside the immediate vicinity of the rail stations. Stations that have high multi-modal access trips, particularly via personal vehicle and connecting buses, are not typically accounted for by DRMs. Hence, this study focuses on pedestrian-based rail boardings only, a metric that also allows the use of a large scale onboard survey distributed by the Atlanta Regional Commission (ARC) in late 2009 and early 2010 in Atlanta, Georgia. Analysis of the large scale on-board ridership survey also reveals variables that may be useful in forecasting ridership at the station level when coupled with available census data. Comparison of variables such as income, age, gender, ethnicity, and race from census data with the large scale survey guided the selection of candidate variables to be included in a DRM for MARTA rail stations. Results from the comparison showed that using census data in DRMs does not always accurately reflect the ridership demographics. Notable differences in pedestrian-based ridership and transit catchments appear to occur in populations making less than $40,000, African American populations, and the young and elderly populations. Large differences in the survey and census data reported around the stations raise questions about the usability of census data in predicting ridership at rail stations. Despite the shortcomings of using census data to directly predict walk access transit ridership, an ordinary least squared (OLS) regression model predicts a high proportion of variance of pedestrian-based ridership in Atlanta, Georgia. A small number of variables were incorporated into a DRM to show the strong relationship of employment density with pedestrian based ridership. The number of low income residents was also influential in increasing ridership via walk access.
36

Dagsverket : En undersökning om hur e-handeln kan producera reklamfilm med begränsade resurser på kort tid

Ekblad, Mårten January 2019 (has links)
Den här undersökningen i audiovisuella studier undersöker möjligheter att lättrörligt och resurssnålt producera reklamfilm för e-handeln. För att undersöka de möjligheterna och föreslå sätt att producera reklamfilm har en case-studie gjorts på ett svenskt glasbruk. Forskningsfrågan formulerades på följande sätt: Hur kan detaljhandelsföretag med e-handel snabbt och med begränsade resurser göra värdefull reklamfilm? De teorier undersökningen stödjer sig på är agila metoder, iterativitet, designteori samt ledarskap- och organisationsteorier. Metoden i undersökningen är Design Research Methodology, DRM, och har genomförts med fyra faser. Resultatet av undersökningen är en produktionsmodell som diskuterar möjligheter och förutsättningar för ett team att för en kund producera reklamfilm inom ramarna för en arbetsdag. Produktionsmodellen One Day Agile Production Model utvecklas i undersökningen och är ett förslag på ett supportverktyg som kan användas för lättrörlig och snabb reklamfilmproduktion
37

Proposta de um sistema de distribuição de licenças de uso para IPTV. / Proposal of a usage licenses distribution system for IPTV.

Pires, Daniel Fernandes Theophilo de Almeida 19 July 2007 (has links)
A Internet consolidou as redes IP como uma infra-estrutura de transporte de dados barata e versátil, fato que justifica o crescente interesse nela como infraestrutura de transporte para outros serviços, como telefonia e TV. Esta convergência de serviços tem base no amadurecimento das tecnologias de redes de transmissão de dados, que proporcionou o aumento da velocidade de conexão residencial, tornando cada vez mais viável o uso de aplicações multimídia, inclusive em tempo real. Desta demanda de serviços convergentes, nasceu a digitalização da TV e, posteriormente, a possibilidade de transmissão pelas redes IP, conhecida como IPTV. Este trabalho analisa o cenário atual de IPTV para distribuição de conteúdo multimídia em redes de acesso privadas. Parte-se da necessidade de mecanismos de segurança para distribuição e controle do consumo das mídias digitais no sistema. O trabalho analisa, portanto, mecanismos para descrição inequívoca dos direitos que os usuários têm sobre o conteúdo adquirido, bem como a utilização de tecnologias para a transmissão do conteúdo de forma segura. O trabalho visa contribuir para a comunidade científica a partir da utilização de padrões abertos na especificação de um elemento de distribuição de vídeo em uma plataforma IPTV. Este elemento se baseia em políticas de uso da linguagem de expressão de direitos do MPEG-21 para reforçar os direitos de autoria e distribuição do conteúdo durante seu manuseio em toda a cadeia de negócios. / Internet consolidated IP networks as a versatile and accessible data transport infrastructure, thus justifying the growing interest on it as a transport network for several services, such as telephony and TV. The convergence leverages on the maturity of network technologies, responsible for the increasing availability of bandwidth for residential access, making the use of multimedia applications, including interactive ones, possible. From the demand for convergence, Digital TV has born, and later on, its transmission through IP networks, know as IPTV. This work analyzes current IPTV scenario for multimedia content distribution in the scope of private networks. It is based on the need for security mechanisms for digital content delivering and control of consumption in the system. Therefore it analyzes mechanisms for rights description, as well as security transmission of content. This work\'s contribution stems from the reutilization of open standards in the specification of a distribution broker in the IPTV environment. Such broker is based on the MPEG-21 digital rights description to enforce copyright of digital content during handling in the entire value chain.
38

Öppna format (Lagring över tid) / Open formats (Storing over time)

Anderson, Magnus, Ly, Hans January 2007 (has links)
Vi lagrar data mer än någonsin. Idag lagrar vi enligt analysföretaget IDC1(2007) upp emot 36 gånger mer information än vad vi gjorde under 1998.Men få tänker på säkerheten vid lagring av data. Med säkerhet menar vi härsäkerheten att datan som lagrats fortfarande kommer att kunna öppnas om 15-20 år.Med format i denna studie syftar vi huvudsakligen på filformat. HTML,JPEG, GIF, etc. är exempel på filformat i vilket information kodas för attkunna lagras. Vad innebär det i själva verket när man lagrar information it.ex. en DOC-fil? IDG (2007)Vilka faktorer kan påverka en filformats levnad? Vad bör man tänka på föratt data som lagras skall vara möjlig att öppna längre fram? Vi kommer att idenna studie redogöra för vilka risker som kan leda till att data kan gåförlorad. Därtill kommer vi att undersöka om huruvida öppna format kanerbjuda en lösning till problemet. Vidare kommer vi även att utreda omtekniker som emulering och virtualisering kan ge en lösning åt data somredan har gått förlorad. Kan öppna filformat vara en lösning på problemet?Vår förhoppning är att det som vi tagit upp i denna studie kommer attuppmärksamma frågor kring lagring av data över tid, öppna format samtinspirera till nya och intressanta frågor kring datalagring. / Uppsatsnivå: C
39

Procesní analýza a softwarová realizace prodeje elektronických časopisů / Process analysis of selling electronic magazines online

Burda, Adam January 2011 (has links)
This work is focused on business process modeling and subsequent use in, how it works selling electronic magazines online. In the theoretical section describes possible options for modeling languages, then selected BPM notation and described in detail. The second section describes the technologies used to support sales of electronic magazines. In this work an example is Skimagazin magazine. In the final phase of work are given individual detailed models of how the sale works in practice. The models are mainly focused on describing how to communicate with each individual system elements and users or administrators. Due to the large degree of detail models are listed here only the main models for the functioning of online sales. At the end structure of data objects is described.
40

Proposta de um sistema de distribuição de licenças de uso para IPTV. / Proposal of a usage licenses distribution system for IPTV.

Daniel Fernandes Theophilo de Almeida Pires 19 July 2007 (has links)
A Internet consolidou as redes IP como uma infra-estrutura de transporte de dados barata e versátil, fato que justifica o crescente interesse nela como infraestrutura de transporte para outros serviços, como telefonia e TV. Esta convergência de serviços tem base no amadurecimento das tecnologias de redes de transmissão de dados, que proporcionou o aumento da velocidade de conexão residencial, tornando cada vez mais viável o uso de aplicações multimídia, inclusive em tempo real. Desta demanda de serviços convergentes, nasceu a digitalização da TV e, posteriormente, a possibilidade de transmissão pelas redes IP, conhecida como IPTV. Este trabalho analisa o cenário atual de IPTV para distribuição de conteúdo multimídia em redes de acesso privadas. Parte-se da necessidade de mecanismos de segurança para distribuição e controle do consumo das mídias digitais no sistema. O trabalho analisa, portanto, mecanismos para descrição inequívoca dos direitos que os usuários têm sobre o conteúdo adquirido, bem como a utilização de tecnologias para a transmissão do conteúdo de forma segura. O trabalho visa contribuir para a comunidade científica a partir da utilização de padrões abertos na especificação de um elemento de distribuição de vídeo em uma plataforma IPTV. Este elemento se baseia em políticas de uso da linguagem de expressão de direitos do MPEG-21 para reforçar os direitos de autoria e distribuição do conteúdo durante seu manuseio em toda a cadeia de negócios. / Internet consolidated IP networks as a versatile and accessible data transport infrastructure, thus justifying the growing interest on it as a transport network for several services, such as telephony and TV. The convergence leverages on the maturity of network technologies, responsible for the increasing availability of bandwidth for residential access, making the use of multimedia applications, including interactive ones, possible. From the demand for convergence, Digital TV has born, and later on, its transmission through IP networks, know as IPTV. This work analyzes current IPTV scenario for multimedia content distribution in the scope of private networks. It is based on the need for security mechanisms for digital content delivering and control of consumption in the system. Therefore it analyzes mechanisms for rights description, as well as security transmission of content. This work\'s contribution stems from the reutilization of open standards in the specification of a distribution broker in the IPTV environment. Such broker is based on the MPEG-21 digital rights description to enforce copyright of digital content during handling in the entire value chain.

Page generated in 0.0674 seconds