Skip to main content

Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies

  • Conference paper
Information Systems Security (ICISS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3803))

Included in the following conference series:

Abstract

As the global information infrastructure is becoming more and more ubiquitous, digital business transactions are increasingly performed using a variety of mobile devices and across multiple communication channels. In this new paradigm of pervasive access, a much richer context representation regarding both users and the resources they access could be available to applications, potentially supporting highly expressive and intelligent policies regulating access and fruition. On the other hand, checking advanced context-related information when evaluating a policy involves several unsolved research issues, often due to underlying technology. Predicates representing users position and posture (e.g., as shown in a video feed), for instance, are semantically different from traditional ones inasmuch their outcome is both highly dynamic and uncertain. The aim of this work is twofold: (i) presenting some of our recent work in dynamic context representation, including data streams encoding users location and video images. (ii) discussing the integration of dynamic context representation within current approaches to negotiated access control in a mobile environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. US FCC Enhanced 911 Fac Sheet 2001 (January 14 2004), http://www.fcc.gov/911/enhanced/release/factsheet_requirements_012001.pdf

  2. Wölfle, G., Hoppe, R., Zimmermann, D., Landstorfer, F.M.: Enhanced Localization Technique within Urban and Indoor Environments based on Acurate and Fast Propagation Models. In: European Wireless 2002, Firenze (Italy) (February 2002)

    Google Scholar 

  3. Wertz, P., Hoppe, R., Zimmermann, D., Wölfle, G., Landstorfer, F.M.: Enhanced Localization Technique within Urban and Indoor Environments. In: 3rd COST 237 MCM-Meeting in Guildford, UK (January 2002)

    Google Scholar 

  4. Vidal, J., Nàjar, M., Jàtiva, R.: High resolution time-of-arrival detection for wireless positioning systems. In: Proceedings of IEEE Vehicular Technology Conference (VTC) (2002)

    Google Scholar 

  5. Caffery Jr., J.J., Stüber, G.L.: Overview of Radiolocation in CDMA Cellular Systems. IEEE Communications Magazine (April 1998)

    Google Scholar 

  6. Zimmermmann, D., Baumann, J., Layh, M., Landstorfer, F., Hoppe, R., Wölfle, G.: Database Correlection for Positioning of Mobile Terminals in Cellular Networks using Wave Propagation Models. In: Proceedings of IEEE Vehicular Technology Conference (VTC) (2004)

    Google Scholar 

  7. Damosso, E., et al.: COST 231:Digital mobile radio towards future generation systems. In: Final report to European Commission, Bruxelles (1999)

    Google Scholar 

  8. Hoppe, R., Wölfle, G., Landstorfer, F.: Fast 3-D Ray Tracing for the Planning of Microcells by Intelligent Preprocessing of the Data Base. In: Proceedings of 3rd European Personal and Mobile Communication Conference (EPMCC), Paris (March 1999)

    Google Scholar 

  9. Kalman, R.E.: A New Approach to Linear Filtering and Prediction Problems. Transactions of the ASME-Journal of Basic Engineering 82(Series D), 35–45 (1960)

    Google Scholar 

  10. Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face Recognition: A Literature Survey. ACM Computing Surveys 35(4), 399–458 (2003)

    Article  Google Scholar 

  11. Georghiades, A.S., Belhumeur, P.N., Kriegman, D.J.: From Few to Many: Illumination Cone Models for Face Recognition Under Variable Lighting and Pose. IEEE Transactions on Pattern Analysis and Machine Intelligence 23(6), 643–660 (2001)

    Article  Google Scholar 

  12. Hallinan, P.W.: A Deformable Model for the Recognition of Human Faces under Arbitrary Illumination. Harvard Univ., Cambridge (1995)

    Google Scholar 

  13. Sim, T., Kanade, T.: Combining Models and Exemplar for Face Recognition: An Illuminating Example. In: Proc. of Workshop on Models versus Exemplar in Computer Vision, CVPR (2001)

    Google Scholar 

  14. Prante, T., Streitz, N., Tandler, P.: Roomware: Computers Disappear and Interaction Evolves. IEEE Computer 37(12) (2004)

    Google Scholar 

  15. Ekman, P., Friesen, W.: Facial Action Coding System: A Technique for the Measurement of Facial Movement. Consulting Psychologists Press, Palo Alto (1978)

    Google Scholar 

  16. Geer, D.: The E911 dilemma. Wireless Business and Technology (November/December 2001)

    Google Scholar 

  17. Bellandi, V., Anisetti, M., Beverina, F.: Upper-Face Expression Features Extraction System for Video Sequences. In: Proceeding of the Fifth IASTED Visualization Imaging, and Image Processing (VIIP 2005), Benidorm, Spagna, pp. 83–88 (2005)

    Google Scholar 

  18. Tian, Y.-L., Kanade, T., Cohn, J.: Dual-state Parametric Eye Tracking. In: Proceedings of the 4th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2000), pp. 110–115 (March 2000)

    Google Scholar 

  19. Schlit, B.: Ubiquitous location-aware computing and the Place Lab Initiative. In: Proc. of the First ACM Intl. Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, San Diego, CA (September 2003)

    Google Scholar 

  20. Anisetti, M., Bellandi, V., Damiani, E., Reale, S.: Localization and tracking of mobile antenna in urban environment. In: Proceeding of the IST 2005 - International Symposium on Telecommunications, Shiraz, Iran (2005)

    Google Scholar 

  21. Damiani, E., Anisetti, M., Bellandi, V., Beverina, F.: Facial identification problem: A tracking based approach. In: IEEE International Symposium on Signal-Image Technology and Internet–Based Systems (IEEE SITIS 2005), Yaoundé, Cameroon (2005)

    Google Scholar 

  22. Hightower, J., Borriello, G.: Location systems for ubiquitous computing. IEEE Computer 34(8) (August 2001)

    Google Scholar 

  23. Coutaz, J., Crowley, J.L., Dobson, S., Garlan, D.: Context is Key. Comm. of the ACM 48(3) (March 2005)

    Google Scholar 

  24. Lahlou, S., Jegou, F.: European Disappearing Computer Privacy Design Guidelines V1.0. Ambient Agoras Report D15.4, Disappearing Computer Initiative (October 2003)

    Google Scholar 

  25. Azzini, A., Ceravolo, P., Damiani, E.: Generating Context Metadata Based On Biometric Systems. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 119–126. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Hightower, J., Borriello, G.: Particle filters for location estimation in ubiquitous computing: A case study. In: Proc. of the VI Int. Conference on Ubiquitous Computing, Nottingham, U.K. (September 2004)

    Google Scholar 

  27. Bonatti, P.A., Samarati, P.: Logics for Authorization and Security. Logics for Emerging Applications of Databases, 277–323 (2003)

    Google Scholar 

  28. van Rijsbergen, C.J.: A Non-Classical Logic for Information Retrieval. The Computer Journal 29(6), 481–485 (1986)

    Article  MATH  Google Scholar 

  29. Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufman, San Francisco (1988)

    Google Scholar 

  30. Glasgow, J., Macewen, G., Panangaden, P.: A logic for reasoning about security. ACM Transactions on Computer Systems (TOCS) 10(3) (August 1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Damiani, E., Anisetti, M., Bellandi, V. (2005). Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2005. Lecture Notes in Computer Science, vol 3803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593980_2

Download citation

  • DOI: https://doi.org/10.1007/11593980_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30706-8

  • Online ISBN: 978-3-540-32422-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics