Authorized! access denied, unauthorized! access granted

  title={Authorized! access denied, unauthorized! access granted},
  author={Abdulaziz Almehmadi and Khalil El-Khatib},
Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening. To address the limitation of current access control systems, we propose an access control method that is based on feelings which relates an access decision… 

Figures from this paper

A Survey on Attribute Based Access Control (ABAC) with Application in Cloud IAAS
Moves for ensuring proper attribute value assignments to entities have not been well studied and are necessary to protect against unauthorized access in an ABAC system.
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring
An insider threat monitoring system called Physiological Signals Monitoring (PSM) is designed that detects incidents seconds before they occur and shows the promise of the proposed solution with all of the tested incidents being correctly classified with Nearest Neighbor and Functional Trees classifiers.
On the Potential of Intent-based Access Control (IBAC) in Preventing Insider Threats
..................................................................................................................... II ACKNOWLEDGMENTS
Automation of Authorisation Vulnerability Detection in Authenticated Web Applications
A glossary of terms and some of the main concepts used in this chapter are described.
A Policy-Based Management Approach to Security in Cloud Systems
In the era of service-oriented computing, ICT systems exponentially grow in their size and complexity, becoming more and more dynamic and distributed, often spanning across different geographical


An introduction to biometric recognition
A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Continuous authentication by electrocardiogram data
The electrocardiogram (ECG) data is used as a soft biometric to continuously authenticate the identity of the user and Experimental results demonstrate that electrocardsiogram biometric trait can guarantee the safety of the system from illegal access.
Emotion detection using noisy EEG data
This paper proposes an approach that analyzes highly contaminated EEG data produced from a new emotion elicitation technique and uses a feature selection mechanism to extract features that are relevant to the emotion detection task based on neuroscience findings.
Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential
INTRODUCTIONImagine a time when a close friend or parent spoke to you. In the case of your parent, you knew immediately if they were angry or happy with you from their voice alone. Your parent spoke
Beyond smile dynamics: mimicry and beliefs in judgments of smiles.
Predictions of the Simulation of Smiles Model (SIMS) confirmed the hypotheses that facial mimicry provides feedback that is used to judge the meaning of a smile, and that beliefs about the situations in which a smile occurs guides such judgments when mimicry is inhibited.
Biometric Authentication using Brain Responses to Visual Stimuli
The results showed that visual evoked potentials are suitable for an accurate biometric authentication.
Emotion Recognition Using the Emotiv EPOC Device
The experimental results show that the Emotiv headset can be used for emotion recognition and that the AdaBoost.M1 technique and the theta band provide the highest recognition rates.
Time-Frequency Analysis of EEG Signals for Human Emotion Detection
Results confirm the possibility of using "db4" wavelet transform based feature extraction with proposed statistical feature for assessing the human emotions from EEG signal.
Emotion recognition using EEG signals with relative power values and Bayesian network
This paper proposes an emotion recognition system for human brain signals using EEG signals, which is divided into five frequency ranges on the basis of power spectrum density, and eliminates low frequencies from 0 to 4 Hz to eliminate EEG artifacts.
Biometric person authentication using new spectral features of electroencephalogram (EEG)
Simple spectral features of the EEG are proposed to make the authentication system using the EEG more practical and the effectiveness of the proposed new features is evaluated.