Authorized! access denied, unauthorized! access granted

@inproceedings{Almehmadi2013AuthorizedAD,
  title={Authorized! access denied, unauthorized! access granted},
  author={Abdulaziz Almehmadi and K. El-Khatib},
  booktitle={SIN},
  year={2013}
}
Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening. To address the limitation of current access control systems, we propose an access control method that is based on feelings which relates an access decision… Expand
A Survey on Attribute Based Access Control (ABAC) with Application in Cloud IAAS
Recently, attribute based access control (ABAC) has received considerable attention from thesecurity community for its policy flexibility and dynamic decisionmaking capabilities. The generalidea ofExpand
A Policy-Based Management Approach to Security in Cloud Systems
In the era of service-oriented computing, ICT systems exponentially grow in their size and complexity, becoming more and more dynamic and distributed, often spanning across different geographicalExpand
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring
TLDR
An insider threat monitoring system called Physiological Signals Monitoring (PSM) is designed that detects incidents seconds before they occur and shows the promise of the proposed solution with all of the tested incidents being correctly classified with Nearest Neighbor and Functional Trees classifiers. Expand
On the Potential of Intent-based Access Control (IBAC) in Preventing Insider Threats
..................................................................................................................... II ACKNOWLEDGMENTSExpand
Automation of Authorisation Vulnerability Detection in Authenticated Web Applications
TLDR
A glossary of terms and some of the main concepts used in this chapter are described. Expand

References

SHOWING 1-10 OF 19 REFERENCES
An introduction to biometric recognition
TLDR
A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized. Expand
Continuous authentication by electrocardiogram data
TLDR
The electrocardiogram (ECG) data is used as a soft biometric to continuously authenticate the identity of the user and Experimental results demonstrate that electrocardsiogram biometric trait can guarantee the safety of the system from illegal access. Expand
Emotion detection using noisy EEG data
TLDR
This paper proposes an approach that analyzes highly contaminated EEG data produced from a new emotion elicitation technique and uses a feature selection mechanism to extract features that are relevant to the emotion detection task based on neuroscience findings. Expand
Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential
INTRODUCTIONImagine a time when a close friend or parent spoke to you. In the case of your parent, you knew immediately if they were angry or happy with you from their voice alone. Your parent spokeExpand
Beyond smile dynamics: mimicry and beliefs in judgments of smiles.
TLDR
Predictions of the Simulation of Smiles Model (SIMS) confirmed the hypotheses that facial mimicry provides feedback that is used to judge the meaning of a smile, and that beliefs about the situations in which a smile occurs guides such judgments when mimicry is inhibited. Expand
Analysis of effective channel placement for an EEG-based biometric system
TLDR
Results show that data from eyes open and eyes closed using 4 channels gave good classification rates of 96% and 97% respectively and that data recorded from 2 channels gave classification rates from 90% to 95%. Expand
Biometric Authentication using Brain Responses to Visual Stimuli
TLDR
The results showed that visual evoked potentials are suitable for an accurate biometric authentication. Expand
Emotion Recognition Using the Emotiv EPOC Device
TLDR
The experimental results show that the Emotiv headset can be used for emotion recognition and that the AdaBoost.M1 technique and the theta band provide the highest recognition rates. Expand
Time-Frequency Analysis of EEG Signals for Human Emotion Detection
This paper proposes an emotion recognition sys- tem from EEG (Electroencephalogram) signals. The main objective of this work is to compare the efficacy of classifying human emotions using twoExpand
Emotion recognition using EEG signals with relative power values and Bayesian network
TLDR
This paper proposes an emotion recognition system for human brain signals using EEG signals, which is divided into five frequency ranges on the basis of power spectrum density, and eliminates low frequencies from 0 to 4 Hz to eliminate EEG artifacts. Expand
...
1
2
...