No Purpose – No Data: Goal-Oriented Access Control for Ambient Assisted Living Università delgi Studi di Trento Fabio Massacci, Viet Hung Nguyen, Ayda.

Slides:



Advertisements
Similar presentations
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
Advertisements

Purdue University Center for Education and Research in Information Assurance and Security Building a distributed intrusion detection system with Perl Diego.
Objective: Know the sum of angles at a point, on a straight line and in a triangle. Vocabulary:
My AmeriCorps Release 3 AmeriCorps National Programs User Roles and Management – Understanding & Planning Presentation developed for the Corporation for.
Whiteboardmaths.com © 2004 All rights reserved
Team 1 Team Guidelines Slide 1 – Numbers are hyperlinked to slides, you can edit the information on each slide – to include.
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Senigallia, June 2007 Microelectronics Research Group Università Politecnica delle Marche, Ancona Wireless Sensor Networks for Civil Protection.
Semantic Event Processing in ENVISION Alejandro Llaves, Patrick Maué, Henry Michels, & Marcell Roth Institute for Geoinformatics University of Muenster.
A Primer on Call and Put Options
Future Internet boosting Creativity in Europe: XIFI Project Jose Gonzalez Universidad Politecnica Madrid
GAF: AH systems analysis approach Evgeny Knutov Paul De Bra Mykola Pechenizkiy
Writing Equivalent Forms of Quadratic Functions
IT Infrastructure for Energy Efficiency in Future Cities: From the Smart Home to the Smart Grid Chief Investigators: CS&IT: Prof. Zahir Tari, Dr Caspar.
End Find the missing Angle measure? r || s A.45˚ B.145 ˚ C.155 ˚ D.Not enough information 35˚ ?˚ r s.
FP7-SEC SGL for USaR “SGL for USaR” EC FP7 Project Milt Statheropoulos Project Coordinator International Symposium on Crisis Management Pandora.
Spring 2010 – Dr. Son VuongCpsc Cpsc 527 Project List n LIVES (Mobile Learning) (Learning through Interactive Voice Educational System) u A alpha-beta.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
EHealth Challenges and Opportunities E-health: Multi-disciplinary of E (ICT) and Healthcare, or applied ICT in healthcare (Design oriented), or healthcare.
AMBIENT INTELLIGENCE Presented by GOKUL SURESH. INTRODUCTION  Evolution of Ambient Intelligence.  Science with a fictional view.  Enriching environment.
Fine-grained Access Control for Spatial Services...e nforcing the Need-to-Know Principle Rüdiger Gartmann con terra GmbH, Münster, Germany.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
Anthony D. Wood, John A. Stankovic, Gilles Virone, Leo Selavo, Zhimin He, Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang, and Radu Stoleru University of Virginia.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
1 Michael Huch Ambient Assisted Living Preparing a European RTD programme Michael Huch VDI/VDE Innovation + Technik GmbH phone:
AIACE - Assisted and Intelligent Ambient for a Community Enlarged to all SMART CITIES AND COMMUNITIES AND SOCIAL INNOVATION 1 a new model of connected.
Context Modeling and Reasoning Framework for CARA Pervasive Healthcare
Ambient Assisted Living (AAL) Study Session TC 100 AGS Meeting Dallas, 15 May 2012 Ulrike Haltrich IEC TC100 AAL Study Session1.
VA-SAMHSA DS4P Pilot – Phase 2 HIMSS13 Sprint 4 VA Activities Pilot Project Partnership VA SAMHSA Jericho Systems MITRE HIPAAT Data Segmentation for Privacy.
Usability in Pervasive Computing Environment Advance Usability October 18, 2004 Anuj A. Nanavati.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, & Management, 6 th Edition, Rob & Coronel Learning Objectives.
IoT and Telecom Infrastructure GISFI # 07, Dec 19-22, 2011, New Delhi Author: Niranth Organization: Huawei Doc No: GISFI_IoT_
Authorization in Trust Management Conditional Delegation and Attribute-Based Role Assignment using XACML and RBAC Brian Garback © Brian Garback 2005.
IPerCS + CENS Embedding Social Responsibility Dana Cuff UCLA Department of Architecture and Urban Design Department of Urban Planning.
© 2014 The MITRE Corporation. All rights Reserved. Roger Westman Principal Information Security Engineer September 29, 2014 Authorization.
Privilege Management Chapter 22.
JORGE JUAN RODRÍGUEZ PEDRO GARIBI DESCRIPTION OF THE IMPLEMENTATION OF WP6 TO 9 IN DELIVERABLE D9.1.
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
CMGT 430 OUTLET Teaching Effectively/ FOR MORE CLASSES VISIT
Accelerometer based motion gestures for mobile devices Presented by – Neel Parikh Advisor Committee members Dr. Chris Pollett Dr. Robert Chun Dr. Mark.
Doc.: IEEE /0334r0 March 2016 SubmissionStéphane Baron et al., Canon Scenario for LRLP SIG Date: Slide 1 Authors: NameAffiliationAddress .
An Open User Centric Smart Home Architecture Supervisors: Oz Shmueli & Alexander Kinko 1 Anastasia Logvinenko Atara Maltzman.
DBM 265 Week 4 Individual Assignment DBMS Support and Security Paper Write a 750- to 1,000-word paper in which you discuss the support and security strategies.
Embedded Autonomous Wheelchair Navigation System for AAL Scenarios
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Chapter 8 Analysis Engineering
University of Trento, Italy
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Configure Instruction
Ambient Assisted Living
Geo Rights Management (GeoRM) Hats and Doors?
Security Enhanced Administrative Role Based Access Control Models
Data and Applications Security Developments and Directions
Presentation for information days Units involved:
Design for Assisted Living
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
User-configurable in-home assistive monitoring aka "Power to the people" Possible fall detected Frank Vahid, UCR.
Presentation for information days Units involved:
Securing Home IoT Environments with Attribute-Based Access Control
eCareTaker: Context Aware Web Services
Audio Analytics & Content Management (VCMS)
Elecbits.
We decided to spice it up…
Detecting Conflicts of Interest
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
Data and Applications Security Developments and Directions
Jiexi Wang Master of Computer Science Program
Presentation transcript:

No Purpose – No Data: Goal-Oriented Access Control for Ambient Assisted Living Università delgi Studi di Trento Fabio Massacci, Viet Hung Nguyen, Ayda Saidane This work is partial supported by EU committee with grant of PrimeLife/IFIP 2009 Summer School, 7 th – 11 th Sep, 2009, Nice, France

Università degli Studi di TrentoGlance Ambient Assisted Living (AAL) Demo Goal-oriented Role Based Access Control Summary 5/2/20142Goal Oriented RBAC

Università degli Studi di Trento Ambient Assisted Living (AAL) AAL is a home environment enhanced with embedded technologies –Cameras –Oximeter –Smart T-shirt –… 35/2/2014Goal Oriented RBAC

Università degli Studi di Trento Concrete scenario We do not want our medical data out unless it serves some purposes: privacy requirement We want to be monitored even if one of monitor devices fails: dependability requirement 45/2/2014Goal Oriented RBAC MERC

Università degli Studi di Trento Smart-Home prototype 55/2/2014Goal Oriented RBAC

Università degli Studi di Trento Video demo 65/2/2014Goal Oriented RBAC

Università degli Studi di Trento Organizational Model –Goals, Actors 75/2/2014 Handle emergency Detect emergency Response to emergency Collect sensor data Detect emergency from sensor data Smart Home Sensor Manager Camera Handler Goal Oriented RBAC

Università degli Studi di Trento Organizational Model –Goals, Actors, Goals-to-Actors assignment 85/2/2014 Handle emergency Detect emergency Response to emergency Collect sensor data Detect emergency from sensor data Smart Home Sensor Manager Camera Handler Goal Oriented RBAC

Università degli Studi di Trento Organizational Model –Goals, Actors, Goals-to-Actors assignment 95/2/2014 Smart Home Sensor Manager Camera Handler Handle emergency Detect emergency Response to emergency Collect sensor data Detect emergency from sensor data Oximeter Handler Goal Oriented RBAC

Università degli Studi di Trento Goal-Oriented Role-Based Access Control Organizational model –Privacy goals E.g., MERC wants to check out medical data for monitoring purpose –Critical goals E.g., Access monitor devices data in an emergency –Normal goals Access control strategies –Privacy setting Privacy resources are accessed by authorized agents if and only if it is needed –Dependability setting The derived permissions of all sub goals resources are released once the user is authorized to fulfill the top goal –Normal setting 105/2/2014Goal Oriented RBAC

Università degli Studi di Trento GoRBAC Architecture 115/2/2014Goal Oriented RBAC

Università degli Studi di Trento Prototype Architecture 125/2/2014Goal Oriented RBAC

Università degli Studi di TrentoSummary AAL security challenges –Privacy requirement –Dependability requirement GoRBAC for AAL applications –Privacy strategy –Dependability strategy –Normal strategy Smart-Home prototype 135/2/2014Goal Oriented RBAC

Università degli Studi di Trento Thank you 145/2/2014Goal Oriented RBAC QUESTIONS ?