52,081 research outputs found
Benefits of Location-Based Access Control:A Literature Study
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud
attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud
the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud
first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud
(i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud
(iii) formulating design criteria for facilities and working environments for optimal LBAC usage
Implanting Life-Cycle Privacy Policies in a Context Database
Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction. Such AmI smartness ability is tightly coupled to quantity and quality of the available (past and present) context. However, context is often linked to an individual (e.g., location of a given person) and as such falls under privacy directives. The goal of this paper is to enable the difficult wedding of privacy (automatically fulfilling users' privacy whishes) and smartness in the AmI. interestingly, privacy requirements in the AmI are different from traditional environments, where systems usually manage durable data (e.g., medical or banking information), collected and updated trustfully either by the donor herself, her doctor, or an employee of her bank. Therefore, proper information disclosure to third parties constitutes a major privacy concern in the traditional studies
Recommended from our members
Identifying the determinants of chronic absenteeism: A bioecological systems approach
Background/Context: Chronic school absenteeism is a pervasive problem across the US; in early education, it is most rampant in kindergarten and its consequences are particularly detrimental, often leading to poorer academic, behavioral and developmental outcomes later in life. Though prior empirical research has identified a broad range of determinants of chronic absenteeism, there lacks a single, unified theoretically driven investigation examining how such factors concurrently explain the incidence of chronic absenteeism among our nation 's youngest schoolchildren. Thus, it is difficult to determine the relative importance of one factor over another, hence making it challenging to develop appropriate supports and services to reduce school absences. Purpose/Research Questions: Our study filled this critical void-we investigated multiple determinants of chronic absenteeism that were grounded, theoretically and empirically, in Bronfenbrenner's bioecological model of development. Specifically, using data from the Early Childhood Longitudinal Study, Kindergarten Class of 2010-11 and the method of hierarchical generalized linear modeling, we analyzed how the co-occurrence of key (a) process, (b) person, and (c) context (micro-, meso-, exo- and macrosystem) factors was associated with kindergarteners' probability of being chronically absent. Findings/Results: Children who have poorer health, higher internalizing behaviors, and more frequent engagement in learning activities at home had higher odds of chronic absenteeism. Also, children from larger families and of lower socioeconomic status faced increased odds of chronic absenteeism. Conversely, children holding positive attitudes towards school had lowered odds of chronic absenteeism, a finding that remained robust across socioeconomic status groups. Finally, parent-school connections were associated with lowered odds of absenteeism. Conclusions/Recommendations: Overall, our findings strongly suggested that addressing chronic absenteeism will require comprehensive and multifaceted approaches that recognize these multiple factors. With this theoretically grounded, more descriptive approach, it is more feasible to identify key factors and subsequently design policies and practices to prevent absence behavior
Is Ambient Intelligence a truly Human-Centric Paradigm in Industry? Current Research and Application Scenario
The use of pervasive networked devices is nowadays a reality in the service sector. It impacts almost all aspects of our daily lives, although most times we are not aware of its influence. This is a fundamental characteristic of the concept of Ambient Intelligence (AmI). Ambient Intelligence aims to change the form of human-computer interaction, focusing on the user needs so they can interact in a more seamless way, with emphasis on greater user-friendliness. The idea of recognizing people and their context situation is not new and has been successfully applied with limitations, for instance, in the health and military sectors. However its appearance in the manufacturing industry has been elusive. Could the concept of AmI turn the current shop floor into a truly human centric environment enabling comprehensive reaction to human presence and action? In this article an AmI scenario is presented and detailed with applications in human’s integrity and safety.Ambient Intelligence, networks, human-computer interaction
SpaceSemantics: an architecture for modeling environments
The notion of modeling location is fundamental to location awareness in ubiquitous computing environments. The investigation of models and the integration with the myriad of location sensing technologies makes for a challenging discipline. Despite notable development of location models, we believe that many challenges remain unresolved. Complexity and scalability, diverse environments coupled with various sensors and managing the privacy and security of sensitive information are open issues. In this paper we discuss our previous experience combining location sensing with mobile agents and how the lessons learnt have lead to the conception of SpaceSemantics, an open architecture for modeling environments
Trust Management Model for Cloud Computing Environment
Software as a service or (SaaS) is a new software development and deployment
paradigm over the cloud and offers Information Technology services dynamically
as "on-demand" basis over the internet. Trust is one of the fundamental
security concepts on storing and delivering such services. In general, trust
factors are integrated into such existent security frameworks in order to add a
security level to entities collaborations through the trust relationship.
However, deploying trust factor in the secured cloud environment are more
complex engineering task due to the existence of heterogeneous types of service
providers and consumers. In this paper, a formal trust management model has
been introduced to manage the trust and its properties for SaaS in cloud
computing environment. The model is capable to represent the direct trust,
recommended trust, reputation etc. formally. For the analysis of the trust
properties in the cloud environment, the proposed approach estimates the trust
value and uncertainty of each peer by computing decay function, number of
positive interactions, reputation factor and satisfaction level for the
collected information.Comment: 5 Pages, 2 Figures, Conferenc
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
- …