Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance

With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get val...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mobile networks and applications 2014-06, Vol.19 (3), p.392-403
Hauptverfasser: Zerkouk, Meriem, Cavalcante, Paulo, Mhamed, Abdallah, Boudy, Jerome, Messabih, Belhadri
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 403
container_issue 3
container_start_page 392
container_title Mobile networks and applications
container_volume 19
creator Zerkouk, Meriem
Cavalcante, Paulo
Mhamed, Abdallah
Boudy, Jerome
Messabih, Belhadri
description With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.
doi_str_mv 10.1007/s11036-014-0516-9
format Article
fullrecord <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01263236v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1567070218</sourcerecordid><originalsourceid>FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</originalsourceid><addsrcrecordid>eNp1kU9rFEEQxQdRMEY_gLcBL3oY7erpv8fNoK6wYg4J5CJNTU-tO6EzvXbPBpJPbw8jIoKnKorfq3rFq6rXwN4DY_pDBmCtahiIhklQjX1SnYHUvDEg26elb03bCGVvnlcvcr5ljElpxFn1_YIOeD_GVOM01B0esR_DOD_UF5hpqDfeU851F6c5xVB_jQOFel_oS0o5ThjGx0JdUaAtYZgPHSaqNzmPecbJ08vq2R5Dple_63l1_enjVbdtdt8-f-k2u8YLUHMzMCW8QMFQqr3WRg2GW9v3yEl5QO55r8hK3dseFPZaMGmUHYAPRhtLrD2v3q17DxjcMY13mB5cxNFtNzu3zBhw1fJW3UNh367sMcWfJ8qzuxuzpxBwonjKDqTSTDMOpqBv_kFv4ymVrxdKMN0q2S7HYaV8ijkn2v9xAMwt4bg1nGJCuCUcZ4uGr5pc2OkHpb82_1f0Czj1j7g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1540736530</pqid></control><display><type>article</type><title>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</title><source>SpringerLink Journals - AutoHoldings</source><creator>Zerkouk, Meriem ; Cavalcante, Paulo ; Mhamed, Abdallah ; Boudy, Jerome ; Messabih, Belhadri</creator><creatorcontrib>Zerkouk, Meriem ; Cavalcante, Paulo ; Mhamed, Abdallah ; Boudy, Jerome ; Messabih, Belhadri</creatorcontrib><description>With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.</description><identifier>ISSN: 1383-469X</identifier><identifier>EISSN: 1572-8153</identifier><identifier>DOI: 10.1007/s11036-014-0516-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Adaptability ; Analysis ; Assisted living facilities ; Classification ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Electrical Engineering ; Electronic monitoring ; Engineering ; Engineering Sciences ; Engines ; Health care ; Health care delivery ; Information Retrieval ; IT in Business ; Literature reviews ; Networking and Internet Architecture ; Networks ; Ontology ; Personalized ; Platforms ; Policies ; Security ; Sensors ; Signal and Image processing ; Studies ; User behavior ; User profiles ; Wearable computers ; Wireless networks</subject><ispartof>Mobile networks and applications, 2014-06, Vol.19 (3), p.392-403</ispartof><rights>Springer Science+Business Media New York 2014</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</citedby><cites>FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</cites><orcidid>0000-0002-0306-091X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11036-014-0516-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11036-014-0516-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,314,780,784,885,27922,27923,41486,42555,51317</link.rule.ids><backlink>$$Uhttps://hal.science/hal-01263236$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Zerkouk, Meriem</creatorcontrib><creatorcontrib>Cavalcante, Paulo</creatorcontrib><creatorcontrib>Mhamed, Abdallah</creatorcontrib><creatorcontrib>Boudy, Jerome</creatorcontrib><creatorcontrib>Messabih, Belhadri</creatorcontrib><title>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</title><title>Mobile networks and applications</title><addtitle>Mobile Netw Appl</addtitle><description>With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.</description><subject>Access control</subject><subject>Adaptability</subject><subject>Analysis</subject><subject>Assisted living facilities</subject><subject>Classification</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Electrical Engineering</subject><subject>Electronic monitoring</subject><subject>Engineering</subject><subject>Engineering Sciences</subject><subject>Engines</subject><subject>Health care</subject><subject>Health care delivery</subject><subject>Information Retrieval</subject><subject>IT in Business</subject><subject>Literature reviews</subject><subject>Networking and Internet Architecture</subject><subject>Networks</subject><subject>Ontology</subject><subject>Personalized</subject><subject>Platforms</subject><subject>Policies</subject><subject>Security</subject><subject>Sensors</subject><subject>Signal and Image processing</subject><subject>Studies</subject><subject>User behavior</subject><subject>User profiles</subject><subject>Wearable computers</subject><subject>Wireless networks</subject><issn>1383-469X</issn><issn>1572-8153</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kU9rFEEQxQdRMEY_gLcBL3oY7erpv8fNoK6wYg4J5CJNTU-tO6EzvXbPBpJPbw8jIoKnKorfq3rFq6rXwN4DY_pDBmCtahiIhklQjX1SnYHUvDEg26elb03bCGVvnlcvcr5ljElpxFn1_YIOeD_GVOM01B0esR_DOD_UF5hpqDfeU851F6c5xVB_jQOFel_oS0o5ThjGx0JdUaAtYZgPHSaqNzmPecbJ08vq2R5Dple_63l1_enjVbdtdt8-f-k2u8YLUHMzMCW8QMFQqr3WRg2GW9v3yEl5QO55r8hK3dseFPZaMGmUHYAPRhtLrD2v3q17DxjcMY13mB5cxNFtNzu3zBhw1fJW3UNh367sMcWfJ8qzuxuzpxBwonjKDqTSTDMOpqBv_kFv4ymVrxdKMN0q2S7HYaV8ijkn2v9xAMwt4bg1nGJCuCUcZ4uGr5pc2OkHpb82_1f0Czj1j7g</recordid><startdate>20140601</startdate><enddate>20140601</enddate><creator>Zerkouk, Meriem</creator><creator>Cavalcante, Paulo</creator><creator>Mhamed, Abdallah</creator><creator>Boudy, Jerome</creator><creator>Messabih, Belhadri</creator><general>Springer US</general><general>Springer Nature B.V</general><general>Springer Verlag</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-0306-091X</orcidid></search><sort><creationdate>20140601</creationdate><title>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</title><author>Zerkouk, Meriem ; Cavalcante, Paulo ; Mhamed, Abdallah ; Boudy, Jerome ; Messabih, Belhadri</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access control</topic><topic>Adaptability</topic><topic>Analysis</topic><topic>Assisted living facilities</topic><topic>Classification</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Electrical Engineering</topic><topic>Electronic monitoring</topic><topic>Engineering</topic><topic>Engineering Sciences</topic><topic>Engines</topic><topic>Health care</topic><topic>Health care delivery</topic><topic>Information Retrieval</topic><topic>IT in Business</topic><topic>Literature reviews</topic><topic>Networking and Internet Architecture</topic><topic>Networks</topic><topic>Ontology</topic><topic>Personalized</topic><topic>Platforms</topic><topic>Policies</topic><topic>Security</topic><topic>Sensors</topic><topic>Signal and Image processing</topic><topic>Studies</topic><topic>User behavior</topic><topic>User profiles</topic><topic>Wearable computers</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zerkouk, Meriem</creatorcontrib><creatorcontrib>Cavalcante, Paulo</creatorcontrib><creatorcontrib>Mhamed, Abdallah</creatorcontrib><creatorcontrib>Boudy, Jerome</creatorcontrib><creatorcontrib>Messabih, Belhadri</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>Mobile networks and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zerkouk, Meriem</au><au>Cavalcante, Paulo</au><au>Mhamed, Abdallah</au><au>Boudy, Jerome</au><au>Messabih, Belhadri</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</atitle><jtitle>Mobile networks and applications</jtitle><stitle>Mobile Netw Appl</stitle><date>2014-06-01</date><risdate>2014</risdate><volume>19</volume><issue>3</issue><spage>392</spage><epage>403</epage><pages>392-403</pages><issn>1383-469X</issn><eissn>1572-8153</eissn><abstract>With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11036-014-0516-9</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-0306-091X</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1383-469X
ispartof Mobile networks and applications, 2014-06, Vol.19 (3), p.392-403
issn 1383-469X
1572-8153
language eng
recordid cdi_hal_primary_oai_HAL_hal_01263236v1
source SpringerLink Journals - AutoHoldings
subjects Access control
Adaptability
Analysis
Assisted living facilities
Classification
Communications Engineering
Computer Communication Networks
Computer Science
Electrical Engineering
Electronic monitoring
Engineering
Engineering Sciences
Engines
Health care
Health care delivery
Information Retrieval
IT in Business
Literature reviews
Networking and Internet Architecture
Networks
Ontology
Personalized
Platforms
Policies
Security
Sensors
Signal and Image processing
Studies
User behavior
User profiles
Wearable computers
Wireless networks
title Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T13%3A03%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Behavior%20and%20Capability%20Based%20Access%20Control%20Model%20for%20Personalized%20TeleHealthCare%20Assistance&rft.jtitle=Mobile%20networks%20and%20applications&rft.au=Zerkouk,%20Meriem&rft.date=2014-06-01&rft.volume=19&rft.issue=3&rft.spage=392&rft.epage=403&rft.pages=392-403&rft.issn=1383-469X&rft.eissn=1572-8153&rft_id=info:doi/10.1007/s11036-014-0516-9&rft_dat=%3Cproquest_hal_p%3E1567070218%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1540736530&rft_id=info:pmid/&rfr_iscdi=true