1,278,342 research outputs found

    Geo-social-rbac: A location-based socially aware access control framework

    Get PDF
    The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks have enabled the collection of rich geo-social information that includes the whereabouts of the users and their social connections. This information can be used to provide a rich set of access control policies that ensure that resources are utilized securely. Existing literature focuses on providing access control systems that control the access solely based on either the location of the users or their social connections. In this paper, we argue that a number of real-world applications demand an access control model that effectively captures both the geographic as well as the social dimensions of the users in a given location. We propose, Geo-social-RBAC, a new role based access control model that allows the inclusion of geo-social constraints as part of the access control policy. Our model, besides capturing the locations of a user requesting access and her social connections, includes geo-social cardinality constraints that dictate how many people related by a particular social relation need to be present in the required locations at the time of an access. The model also allows specification of geo-social and location trace constraints that may be used to dictate if an access needs to be granted or denied

    From Conventional to State-of-the-Art IoT Access Control Models

    Get PDF
    open access articleThe advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the sam

    Dynamic Control System Based On Context for Mobile Devices

    Get PDF
    “To render the accurate information, at correct place in real period with custom-made setup and locality sensitiveness” is the inspiration for every location based information scheme. Android applications in mobile devices may often have access to susceptible data and resources on user device. “Location Based Services” can only provide services that give a data and information to person, wherever he might be through various android applications. To avoid the data misuse by malicious applications, an application may get privilege on the specific user location and thus a Context Based Access Control Mechanism (CBACM) is needed so that privileges can be established and revoked vigorously. A very interesting application include shadowing where immediate information is required to choose if the people being monitored are valid intimidation or an flawed object. The execution of CBACM differentiates between the narrowly located sub-areas within the distinct area. Android operating system is modified such that context based access restriction can be precise and imposed. DOI: 10.17762/ijritcc2321-8169.15057

    Living with MND: An Evaluation of Care Pathways Available to Adults with, and the Families or Carers of Adults with Motor Neurone Disease in Scotland

    Get PDF
    Main Findings Motor Neurone Disease (MND) is a progressive condition that damages motor neurones, the cells that control voluntary muscle activity, in both the spinal cord and the brain. It can cause difficulty in walking and movement, talking, swallowing and breathing and many muscles in the body can become affected. To find out what it is like to live with MND from the perspective of those with the condition we carried out a longitudinal study in which we interviewed 40 people with MND and their partners a number of times over a two year period. We found that: Control, or more particularly the lack of it was the overarching theme that occurred throughout the interviews. People wanted to be consulted, informed and involved in decisions about their health and their social care and where this happened people were more likely to report satisfaction with the service. The diagnosis of MND is a long and protracted process, one that was for many a very distressing experience. 45% of those we spoke to took over 12 months for a diagnosis, 19% over 18 months. Participants had difficulty getting professionals to take their symptoms seriously and once they entered the neurology system many people experienced delays and often the diagnosis was not confirmed by a neurologist. Physical access to hospitals was in some cases difficult. Car parking and the location of the clinic often made it hard for people to get to a hospital appointment. Health professionals had an important role. Good professionals were those who took time to create a sense of teamwork with the person with MND and their family. This was less likely to happen with hospital consultants and where this did not people felt insecure and not listened to. There was also some evidence of poor communication between professionals and medical notes were often not shared between different professionals. Where people accessed general wards they were rarely treated well. Informal carers provided much of the social care and support for those with MND, with spouses meeting most of the need. Whilst many people were happy with this arrangement meeting the need placed a great deal of strain on the families. Many people did not want to rely on care supplied by outside agencies as they did not trust the quality or the reliability of the care and neither did they want their home overrun with people. Housing adaptations and the provision of aids to daily living were for many a great cause of stress and strain and many people felt that they were not involved in the decision making process, felt out of control and unable to influence the situation. The rapidly progressive nature of MND can exacerbate this problem. Social Care and support provided by local authorities was very heavily criticised. There were inconsistencies between services, people felt excluded from decisions made about their care and their care needs and people did not have access to the necessary information to make an informed choice about which services to access. Specialist Care Nurses (SCN) played a vital role in the care and support of those with MND. Not only do they provide help and support directly they also help to act as a champion for the family and coordinate services and service provision. This service is however under great strain and there are a significant number of people for whom this service is not working because the service was too stretched and the resources were not available to allow the SCN to meet their needs

    The Location Privacy Preserving of Social Network Based on RCCAM Access Control

    Get PDF
    Location-based services in social networks provide much convenience for people but bring much risk of location privacy disclosure. Aiming at this problem, a location privacy preservation algorithm based on RCCAM access control model is proposed to assign the accessing users of the access permission and the visibility level of location information through the combination of conflict resolution strategy, permission allocation strategy and location generalization strategy. RCCAM is a relationship-based multi-users cooperation access control model, which takes the same shared contents that may involves the privacy profits of multi-users into consideration. The core of the algorithm is the value of open tendency which depends on the location sensitivity and the intimacy between the users. The conflict resolution strategy adopts the value of open tendency to vote for concessions. The permission allocation strategy and location generalization strategy to obtain the specific access permission and the location visibility level for accessing users according to the value of open tendency. The algorithm can achieve fine-grained control of location publishing of the shared content which involves stakeholder's privacy profit and maintain the sharing will of promulgator as possible

    Augmented Reality for Real-time Navigation Assistance to Wheelchair Users with Obstacles' Management

    Get PDF
    International audienceDespite a rapid technological evolution in the field of technical assistance for people with motor disabilities, their ability to move independently in a wheelchair is still limited. New information and communication technologies (NICT) such as augmented reality (AR) are a real opportunity to integrate people with disabilities into their everyday life and work. AR can afford real-time information about buildings and locations' accessibility through mobile applications that allow the user to have a clear view of the building details. By interacting with augmented environments that appear in the real world using a smart device, users with disabilities have more control of their environment. In this paper, we propose a decision support system using AR for motor disabled people navigation assistance. We describe a real-time wheelchair navigation system equipped with geological mapping that indicates access path to a desired location, the shortest route towards it and identifies obstacles to avoid. The prototyped wheelchair navigation system was developed for use within the University of Lille campus

    User Controlled Privacy Protection in Location-Based Services

    Get PDF
    The rapid development of location-determining technologies has enabled tracking of people or objects more accurately than ever before and the volume and extent of tracking has increased dramatically over time. Within the broader domain of tracking technologies, location-based services (LBS) are a subset of capabilities that allow users to access information relative to their own physical location. However, the personal location information generated by such technologies is at risk of being misused or abused unless protection capabilities are built into the design of such systems. These concerns may ultimately prevent society from achieving the broad range of benefits that otherwise would be available to consumers. The assumption of the emerging location-based industry is that corporations will own and control location and other information about individuals. Traditionally, privacy has been addressed through minimum standard approaches. However, regulatory and technological approaches focused on one size fits all standards are ill equipped to accommodate the interests of individuals or broad groups of users. This research explores the possibility of developing an approach for protecting privacy in the use of location-based services that supports the autonomy of an individual through a combined technological and legal model that places the power to protect location privacy in the hands of consumers. A proof of concept user interface to illustrate how personal information privacy could be protected in the conceptual model is demonstrated. A major goal of this project is to create an operational vision supporting user controlled protection of privacy that can help direct technological efforts along appropriate paths

    Activity maps for location-aware computing

    Get PDF
    The Problem: Location-based context is important for many applications. Previous systems offered only coarse room-level features or used manually specified room regions to determine fine-scale features. We propose a location context mechanism based on activity maps, which define regions of similar context based on observations of 3-D patterns of location and motion in an environment. We describe an algorithm for obtaining activity maps in real time using the spatio-temporal clustering of visual tracking data. Motivation: In many cases, fine grain location based information is preferred. One example would be to control lights and air conditioning, e.g. the desk lamp might light up and the air conditioning starts whenever a user is sitting at his desk. In addition the phone might become activated and the computer screen get invoked from stand-by mode. Similarly in a small group meeting the system could know where and how many people are in the room and could make appropriate settings for lights, air conditioning, and computer tools. For each of these tasks, location context information is important [3]. Simply considering the instantaneous 3-D location of users is useful, but alone is insufficient as context information. Applications have to generalize context information from previous experience, and an application writer would like to access categorical context information, such as what activity

    Protecting Children from Pornography on the Internet: Freedom of Speech is Pitching and Congress May Strike Out

    Get PDF
    The Internet provides the First Amendment’s “freedom of speech” with a world of opportunity. Any person with access to the Internet may take advantage of a wide variety of information and communication methods. This unique medium, known to its users as cyberspace, is located in no particular geographical location and has no centralized control point, but is available to anyone, anywhere in the world with access. In the past twenty years, the Internet, a network of connected computers, has experienced extraordinary growth. The number of “host” computers, or those that store information and relay communications, increased between the years of 1981 and 1996 from three hundred (300) to approximately 9.4 million. As of September 2001, 143 million Americans, or approximately fifty-four percent (54%) of the population, were using the Internet. One of the Internet’s many faces is the World Wide Web (“Web”). With just a click of a mouse, people can explore various webpages containing a wide array of information, pictures, movies, and music. The Web is partly the reason why children and teenagers use computers and the Internet more than any other age group
    • …
    corecore