Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance
With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get val...
Gespeichert in:
Veröffentlicht in: | Mobile networks and applications 2014-06, Vol.19 (3), p.392-403 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 403 |
---|---|
container_issue | 3 |
container_start_page | 392 |
container_title | Mobile networks and applications |
container_volume | 19 |
creator | Zerkouk, Meriem Cavalcante, Paulo Mhamed, Abdallah Boudy, Jerome Messabih, Belhadri |
description | With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy. |
doi_str_mv | 10.1007/s11036-014-0516-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01263236v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1567070218</sourcerecordid><originalsourceid>FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</originalsourceid><addsrcrecordid>eNp1kU9rFEEQxQdRMEY_gLcBL3oY7erpv8fNoK6wYg4J5CJNTU-tO6EzvXbPBpJPbw8jIoKnKorfq3rFq6rXwN4DY_pDBmCtahiIhklQjX1SnYHUvDEg26elb03bCGVvnlcvcr5ljElpxFn1_YIOeD_GVOM01B0esR_DOD_UF5hpqDfeU851F6c5xVB_jQOFel_oS0o5ThjGx0JdUaAtYZgPHSaqNzmPecbJ08vq2R5Dple_63l1_enjVbdtdt8-f-k2u8YLUHMzMCW8QMFQqr3WRg2GW9v3yEl5QO55r8hK3dseFPZaMGmUHYAPRhtLrD2v3q17DxjcMY13mB5cxNFtNzu3zBhw1fJW3UNh367sMcWfJ8qzuxuzpxBwonjKDqTSTDMOpqBv_kFv4ymVrxdKMN0q2S7HYaV8ijkn2v9xAMwt4bg1nGJCuCUcZ4uGr5pc2OkHpb82_1f0Czj1j7g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1540736530</pqid></control><display><type>article</type><title>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</title><source>SpringerLink Journals - AutoHoldings</source><creator>Zerkouk, Meriem ; Cavalcante, Paulo ; Mhamed, Abdallah ; Boudy, Jerome ; Messabih, Belhadri</creator><creatorcontrib>Zerkouk, Meriem ; Cavalcante, Paulo ; Mhamed, Abdallah ; Boudy, Jerome ; Messabih, Belhadri</creatorcontrib><description>With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.</description><identifier>ISSN: 1383-469X</identifier><identifier>EISSN: 1572-8153</identifier><identifier>DOI: 10.1007/s11036-014-0516-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Adaptability ; Analysis ; Assisted living facilities ; Classification ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Electrical Engineering ; Electronic monitoring ; Engineering ; Engineering Sciences ; Engines ; Health care ; Health care delivery ; Information Retrieval ; IT in Business ; Literature reviews ; Networking and Internet Architecture ; Networks ; Ontology ; Personalized ; Platforms ; Policies ; Security ; Sensors ; Signal and Image processing ; Studies ; User behavior ; User profiles ; Wearable computers ; Wireless networks</subject><ispartof>Mobile networks and applications, 2014-06, Vol.19 (3), p.392-403</ispartof><rights>Springer Science+Business Media New York 2014</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</citedby><cites>FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</cites><orcidid>0000-0002-0306-091X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11036-014-0516-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11036-014-0516-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,314,780,784,885,27922,27923,41486,42555,51317</link.rule.ids><backlink>$$Uhttps://hal.science/hal-01263236$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Zerkouk, Meriem</creatorcontrib><creatorcontrib>Cavalcante, Paulo</creatorcontrib><creatorcontrib>Mhamed, Abdallah</creatorcontrib><creatorcontrib>Boudy, Jerome</creatorcontrib><creatorcontrib>Messabih, Belhadri</creatorcontrib><title>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</title><title>Mobile networks and applications</title><addtitle>Mobile Netw Appl</addtitle><description>With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.</description><subject>Access control</subject><subject>Adaptability</subject><subject>Analysis</subject><subject>Assisted living facilities</subject><subject>Classification</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Electrical Engineering</subject><subject>Electronic monitoring</subject><subject>Engineering</subject><subject>Engineering Sciences</subject><subject>Engines</subject><subject>Health care</subject><subject>Health care delivery</subject><subject>Information Retrieval</subject><subject>IT in Business</subject><subject>Literature reviews</subject><subject>Networking and Internet Architecture</subject><subject>Networks</subject><subject>Ontology</subject><subject>Personalized</subject><subject>Platforms</subject><subject>Policies</subject><subject>Security</subject><subject>Sensors</subject><subject>Signal and Image processing</subject><subject>Studies</subject><subject>User behavior</subject><subject>User profiles</subject><subject>Wearable computers</subject><subject>Wireless networks</subject><issn>1383-469X</issn><issn>1572-8153</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kU9rFEEQxQdRMEY_gLcBL3oY7erpv8fNoK6wYg4J5CJNTU-tO6EzvXbPBpJPbw8jIoKnKorfq3rFq6rXwN4DY_pDBmCtahiIhklQjX1SnYHUvDEg26elb03bCGVvnlcvcr5ljElpxFn1_YIOeD_GVOM01B0esR_DOD_UF5hpqDfeU851F6c5xVB_jQOFel_oS0o5ThjGx0JdUaAtYZgPHSaqNzmPecbJ08vq2R5Dple_63l1_enjVbdtdt8-f-k2u8YLUHMzMCW8QMFQqr3WRg2GW9v3yEl5QO55r8hK3dseFPZaMGmUHYAPRhtLrD2v3q17DxjcMY13mB5cxNFtNzu3zBhw1fJW3UNh367sMcWfJ8qzuxuzpxBwonjKDqTSTDMOpqBv_kFv4ymVrxdKMN0q2S7HYaV8ijkn2v9xAMwt4bg1nGJCuCUcZ4uGr5pc2OkHpb82_1f0Czj1j7g</recordid><startdate>20140601</startdate><enddate>20140601</enddate><creator>Zerkouk, Meriem</creator><creator>Cavalcante, Paulo</creator><creator>Mhamed, Abdallah</creator><creator>Boudy, Jerome</creator><creator>Messabih, Belhadri</creator><general>Springer US</general><general>Springer Nature B.V</general><general>Springer Verlag</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-0306-091X</orcidid></search><sort><creationdate>20140601</creationdate><title>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</title><author>Zerkouk, Meriem ; Cavalcante, Paulo ; Mhamed, Abdallah ; Boudy, Jerome ; Messabih, Belhadri</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c416t-d064c4a40a56f7786d8299bba2e6c1a2c2b6e957b9b16ab7405869d12d8789e03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access control</topic><topic>Adaptability</topic><topic>Analysis</topic><topic>Assisted living facilities</topic><topic>Classification</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Electrical Engineering</topic><topic>Electronic monitoring</topic><topic>Engineering</topic><topic>Engineering Sciences</topic><topic>Engines</topic><topic>Health care</topic><topic>Health care delivery</topic><topic>Information Retrieval</topic><topic>IT in Business</topic><topic>Literature reviews</topic><topic>Networking and Internet Architecture</topic><topic>Networks</topic><topic>Ontology</topic><topic>Personalized</topic><topic>Platforms</topic><topic>Policies</topic><topic>Security</topic><topic>Sensors</topic><topic>Signal and Image processing</topic><topic>Studies</topic><topic>User behavior</topic><topic>User profiles</topic><topic>Wearable computers</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zerkouk, Meriem</creatorcontrib><creatorcontrib>Cavalcante, Paulo</creatorcontrib><creatorcontrib>Mhamed, Abdallah</creatorcontrib><creatorcontrib>Boudy, Jerome</creatorcontrib><creatorcontrib>Messabih, Belhadri</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>Mobile networks and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zerkouk, Meriem</au><au>Cavalcante, Paulo</au><au>Mhamed, Abdallah</au><au>Boudy, Jerome</au><au>Messabih, Belhadri</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance</atitle><jtitle>Mobile networks and applications</jtitle><stitle>Mobile Netw Appl</stitle><date>2014-06-01</date><risdate>2014</risdate><volume>19</volume><issue>3</issue><spage>392</spage><epage>403</epage><pages>392-403</pages><issn>1383-469X</issn><eissn>1572-8153</eissn><abstract>With the growing proportion of dependant people (ageing, disabled users), Tele-assistance and Tele-monitoring platforms will play a significant role to deliver an efficient and less-costly remote care in their assistive living environments. Sensor based technology would greatly contribute to get valuable information which should help to provide personalized access to the services available within their living spaces. However, current access control models remain unsuitable due to the lack of completeness, flexibility and adaptability to the user profile. In this paper, we propose a new access control model based on the user capabilities and behavior. This model is evaluated using the data sensed from our tele-monitoring platform in order to assist automatically the dependent people according to the occurred situation. The design of our model is a dynamic ontology and evolving security policy according to the access rules that are used in the inference engine to provide the right service according to the user’s needs. Our security policy reacts according to the detected distress situation derived from the data combination of both the wearable devices and the pervasive sensors. The security policy is managed through the classification and reasoning process. Our classification process aims to extract the behavior patterns which are obtained by mining the data set issued from our Tele-monitoring platform according to the discriminating attributes: fall, posture, movement, time, user presence, pulse and emergency call. Our reasoning process aims to explore the recognized context and the extracted behavior patterns which set up the rule engine to infer the right decision security policy.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11036-014-0516-9</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-0306-091X</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1383-469X |
ispartof | Mobile networks and applications, 2014-06, Vol.19 (3), p.392-403 |
issn | 1383-469X 1572-8153 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_01263236v1 |
source | SpringerLink Journals - AutoHoldings |
subjects | Access control Adaptability Analysis Assisted living facilities Classification Communications Engineering Computer Communication Networks Computer Science Electrical Engineering Electronic monitoring Engineering Engineering Sciences Engines Health care Health care delivery Information Retrieval IT in Business Literature reviews Networking and Internet Architecture Networks Ontology Personalized Platforms Policies Security Sensors Signal and Image processing Studies User behavior User profiles Wearable computers Wireless networks |
title | Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T13%3A03%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Behavior%20and%20Capability%20Based%20Access%20Control%20Model%20for%20Personalized%20TeleHealthCare%20Assistance&rft.jtitle=Mobile%20networks%20and%20applications&rft.au=Zerkouk,%20Meriem&rft.date=2014-06-01&rft.volume=19&rft.issue=3&rft.spage=392&rft.epage=403&rft.pages=392-403&rft.issn=1383-469X&rft.eissn=1572-8153&rft_id=info:doi/10.1007/s11036-014-0516-9&rft_dat=%3Cproquest_hal_p%3E1567070218%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1540736530&rft_id=info:pmid/&rfr_iscdi=true |