8 research outputs found

    The WebID Protocol Enhanced With Group Access, Biometrics, and Access Policies

    Get PDF
    The WebID protocol solves the challenge of remembering usernames and passwords. We enhance this protocol in three ways. First, we give it the ability to manage groups of agents and control their access to resources on the Web. Second, we add support for biometric access control to enhance security. Finally, we add support for OWL-based policies that may be federated and result in flexible access control

    Spring 2019 Undergraduate Research and Creative Inquiry Symposium Book of Abstracts

    Get PDF
    BOOK OF ABSTRACTS SPRING 2019 NC A&T STATE UNIVERSITY UNDERGRADUATE RESEARCH & CREATIVITY SYMPOSIU

    PROFILING - CONCEPTS AND APPLICATIONS

    Get PDF
    Profiling is an approach to put a label or a set of labels on a subject, considering the characteristics of this subject. The New Oxford American Dictionary defines profiling as: “recording and analysis of a person’s psychological and behavioral characteristics, so as to assess or predict his/her capabilities in a certain sphere or to assist in identifying a particular subgroup of people”. This research extends this definition towards things demonstrating that many methods used for profiling of people may be applied for a different type of subjects, namely things. The goal of this research concerns proposing methods for discovery of profiles of users and things with application of Data Science methods. The profiles are utilized in vertical and 2 horizontal scenarios and concern such domains as smart grid and telecommunication (vertical scenarios), and support provided both for the needs of authorization and personalization (horizontal usage).:The thesis consists of eight chapters including an introduction and a summary. First chapter describes motivation for work that was carried out for the last 8 years together with discussion on its importance both for research and business practice. The motivation for this work is much broader and emerges also from business importance of profiling and personalization. The introduction summarizes major research directions, provides research questions, goals and supplementary objectives addressed in the thesis. Research methodology is also described, showing impact of methodological aspects on the work undertaken. Chapter 2 provides introduction to the notion of profiling. The definition of profiling is introduced. Here, also a relation of a user profile to an identity is discussed. The papers included in this chapter show not only how broadly a profile may be understood, but also how a profile may be constructed considering different data sources. Profiling methods are introduced in Chapter 3. This chapter refers to the notion of a profile developed using the BFI-44 personality test and outcomes of a survey related to color preferences of people with a specific personality. Moreover, insights into profiling of relations between people are provided, with a focus on quality of a relation emerging from contacts between two entities. Chapters from 4 to 7 present different scenarios that benefit from application of profiling methods. Chapter 4 starts with introducing the notion of a public utility company that in the thesis is discussed using examples from smart grid and telecommunication. Then, in chapter 4 follows a description of research results regarding profiling for the smart grid, focusing on a profile of a prosumer and forecasting demand and production of the electric energy in the smart grid what can be influenced e.g. by weather or profiles of appliances. Chapter 5 presents application of profiling techniques in the field of telecommunication. Besides presenting profiling methods based on telecommunication data, in particular on Call Detail Records, also scenarios and issues related to privacy and trust are addressed. Chapter 6 and Chapter 7 target at horizontal applications of profiling that may be of benefit for multiple domains. Chapter 6 concerns profiling for authentication using un-typical data sources such as Call Detail Records or data from a mobile phone describing the user behavior. Besides proposing methods, also limitations are discussed. In addition, as a side research effect a methodology for evaluation of authentication methods is proposed. Chapter 7 concerns personalization and consists of two diverse parts. Firstly, behavioral profiles to change interface and behavior of the system are proposed and applied. The performance of solutions personalizing content either locally or on the server is studied. Then, profiles of customers of shopping centers are created based on paths identified using Call Detail Records. The analysis demonstrates that the data that is collected for one purpose, may significantly influence other business scenarios. Chapter 8 summarizes the research results achieved by the author of this document. It presents contribution over state of the art as well as some insights into the future work planned

    IOT based access control technology for higher education. prototype applied to access control and auditory to classrooms at Universidad Autónoma de Bucaramanga - UNAB (Colombia)

    Get PDF
    En Colombia, la mayoría de las IES no cuentan con sistemas automatizados de control de acceso de ingreso a salones de clase. Esto impide se pueda tener información en tiempo real, que permita realizar una auditoría sobre asistencia de estudiantes a clase y cumplimiento por parte de los docentes con los horarios de clase establecidos. En la Universidad Autónoma de Bucaramanga - UNAB, dado que es una institución de puertas abiertas que no restringe el ingreso a ningún ciudadano, llevar esa auditoría de acceso se hace aún más difícil. El registro manual a través de bitácoras de acceso está expuesto a errores por fallos humanos, información desactualizada, mayor esfuerzo logístico y, falencias en cuanto a confiabilidad de la información reportada, entre otros aspectos. Un control de acceso IoT es un sistema automatizado, que permite obtener datos confiables, donde se elimina la intervención humana e interactúa de manera ubicua. En este trabajo de investigación se realizó un prototipo usando tecnología RFID, que permite llevar el control de acceso a un aula de clase en la UNAB. Esto permite que la información se pueda obtener en tiempo real, ayudando a mejorar procesos logísticos de las IES. Tras identificar los requerimientos básicos de este sistema y necesidades específicas de la UNAB, se continuó a la etapa del diseño del prototipo a implementar; luego se implementó en un aula de la universidad para evaluar su uso en el entorno universitario. Los resultados evidencian que un sistema IoT para control de asistencia y auditoría en IES, no solo posee un nivel de aceptación considerable, sino que permite reducir el tiempo que se requería; la velocidad al hacer uso de este sistema, permite usar el tiempo de clase para los temas de la misma y a su vez, cumple con los requisitos dados por el MEN.CONTENIDO Pág. INTRODUCCIÓN….……………………………………………………………………..19 1. PLANTEAMIENTO DEL PROBLEMA, JUSTIFICACIÓN, PREGUNTA DE INVESTIGACIÓN E HIPÓTESIS 20 1.1 JUSTIFICACIÓN 22 1.2 PREGUNTA DE INVESTIGACIÓN 22 1.3 HIPÓTESIS 22 2. OBJETIVOS 23 2.1 OBJETIVO GENERAL 23 2.2 OBJETIVOS ESPECÍFICOS 23 3. ANTECEDENTES 24 4. MARCO REFERENCIAL 26 4.1 MARCO CONCEPTUAL 26 4.1.1 Control de acceso 26 4.1.2 Internet of Things - IoT 26 4.1.3 Institución de Educación Superior - IES 27 4.2 MARCO TEÓRICO 27 4.2.1 SISTEMAS DE CONTROL DE ACCESO 27 4.2.2 Internet of Things 28 4.2.3 Identificación por Radiofrecuencia - RFID 29 4.2.4 Sistemas embebidos 31 4.2.5 Biometría 35 4.2.6 Deserción escolar 36 4.3 ESTADO DEL ARTE 37 4.3.1 Revisión sistemática de la literatura 37 4.3.2 Control de acceso en la actualidad 41 4.4 MARCO LEGAL 46 4.4.1 Normas Colombianas 46 4.4.2 Normas Internacionales 48 5. DISEÑO METODOLÓGICO 51 5.1 FASES DEL PROYECTO DE INVESTIGACIÓN 51 5.2 POBLACIÓN 54 5.2 TÉCNICAS E INSTRUMENTACIÓN DE RECOLECCIÓN DE DATOS 54 6. RESULTADOS 56 6.1 ESTADO DEL ARTE SOBRE SISTEMAS DE CONTROL DE ACCESO BASADOS EN TECNOLOGÍAS DE INTERNET DE LAS COSAS 56 6.2 REQUERIMIENTOS GENERALES, FUNCIONALES Y NO FUNCIONALES, PARA INSTITUCIONES DE EDUCACIÓN SUPERIOR DE LOS SISTEMAS DE CONTROL DE ACCESO BASADOS EN IOT 56 6.2.1 Alcance de la solución 57 6.2.2 Especificación de requerimientos 57 6.3 DISEÑO A NIVEL DE HARDWARE Y SOFTWARE DE UN SISTEMA DE CONTROL DE ACCESO BASADO EN TECNOLOGÍAS IOT 73 6.3.1 Situación actual 73 6.3.2 Encuesta de percepción estudiantil 75 6.3.3 Diseño de hardware 80 6.3.4 Diseño de software 90 6.3.5 Diseño de red 97 6.3.6 Diseño físico del prototipo 101 6.3.7 Construcción del prototipo funcional 102 6.4 IMPLEMENTACIÓN A NIVEL DE HARDWARE Y SOFTWARE, DE UN PROTOTIPO FUNCIONAL DE SISTEMA DE CONTROL DE ACCESO BASADO EN TECNOLOGÍAS IOT 107 6.4.1 Sitio de instalación 107 6.4.2 Comunicación a internet 110 6.4.3 Plataforma web General 111 6.4.4 Datos capturados a partir de la implementación 114 6.5 PRUEBA PILOTO DEL PROTOTIPO IMPLEMENTADO EN UN AULA DE LA UNAB 114 6.5.1 Diseño y marca del producto 115 6.5.2 Ejecución de la prueba piloto 121 6.4.3 Datos capturados a partir de CLASS 125 6.5.4 Encuesta de aceptación de tecnologías en IES 125 7. OTROS RESULTADOS 130 8. CONCLUSIONES 131 LISTA DE ANEXOS 14 REFERENCIAS 133MaestríaIn Colombia, the majority of Higher Education Institutions do not have automated access control systems for classrooms. This prevents to get information in real-time that allows audit of student attendance to class and compliance by teachers with established class schedules. At the Autonomous University of Bucaramanga - UNAB, given that it is an open-door institution that does not restrict entry to any citizen, carrying that access audit becomes even more difficult. The manual registry through access binnacle is exposed to errors in the capture of data due to human failures, outdated information, greater logistical effort, and shortcomings in terms of the reliability of the reported information, among other aspects. Access control based on IoT is an automated system, which allows obtaining reliable data, where human intervention is eliminated and interacts with people in a ubiquitous manner. In this research work, a prototype was made using RFID technology, which allows the control of access to a classroom in the UNAB. This allows the information to be obtained in real time, helping to improve IES logistics processes. After identifying the basic requirements of this system, the specific needs of the UNAB were evaluated and so, moving on to the design stage of the prototype to be implemented; then the implementation of the same in a classroom of the university was carried out together with the tests to evaluate its use in the university environment. The results show that the use of IoT systems for the control of assistance and audit in IES, not only has a considerable level of acceptance, but also allows to reduce the time that was required; the speed when using this system, allows to use class time for the topics of the same and in turn, meets the requirements given by the MEN.Modalidad Presencia

    Preface

    Get PDF
    corecore