Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.

Slides:



Advertisements
Similar presentations
ARSPA04Sadri, Toni1 A Logic-Based Approach to Reasoning with Beliefs about Trust ARSPA 2004 Fariba Sadri 1 and Francesca Toni 1,2 1: Department of Computing,
Advertisements

Workpackage 2: Norms
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
Personnel and Transfer Management (PTM). FOR PERSONNEL BEING TRANSFERRED Lack of automation in the transfer process leads to inefficiency Stress on the.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Childcare Study Edgardo & Zalia Usable Security – CS 6204 – Fall, 2009 – Dennis.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Requirements Engineering n Elicit requirements from customer  Information and control needs, product function and behavior, overall product performance,
25/10/2009Philipp Kärger1 Reactivity and Social Data: Keys to Drive Privacy Decisions in Social Network Applications* * This work was partially supported.
Continuous Compliance Assurance for Trusted Information Sharing: A Research Framework Bonnie W. Morris College of Business & Economics
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Page 1 WWRF - Vision Committee - 15 September 2008 Sudhir Dixit, Chair, Vision Committee WWRF 2020 Vision – Draft V 1.4.
2006/12/191 Using E-CRM for a unified view of the customer COMMUNICATIONS OF THE ACM, April 2003, Vol.46 No.4 Shan L. Pan & Jae-Nam Lee Reporter: Shing-Jiun.
Second Language Acquisition and Real World Applications Alessandro Benati (Director of CAROLE, University of Greenwich, UK) Making.
Purpose of the Standards
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart Phones Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
Presented to: By: Date: Federal Aviation Administration Enterprise Information Management SOA Brown Bag #2 Sam Ceccola – SOA Architect November 17, 2010.
Advanced Database CS-426 Week 2 – Logic Query Languages, Object Model.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Usable Security – CS 6204 – Fall, 2 Universal Building Company marketing manager Chong Li.
Induction New Employees AOI Institute Unit Name: Manage Recruitment Selection and Induction Processes Unit Code: BSBHRM506A: Task Three Student’s ID: C61937.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Web Science Trust Network RPI Web Science Research Center Kickoff Meeting Fall 2012 August 28, PM Winslow 1140.
Feasibility Study.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Information System Development Courses Figure: ISD Course Structure.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: David Shelly Usable Security – CS 6204 – Fall,
A Framework for the Reconfiguration of Ubicomp Systems Pau Giner, Carlos Cetina, Joan Fons, Vicente Pelechano.
Community Board Orientation 6- Community Board Orientation 6-1.
1 Introduction to Software Engineering Lecture 1.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Support the spread of “good practice” in generating, managing, analysing and communicating spatial information 1 Free, Prior and Written Informed Consent.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
Ontology Mapping in Pervasive Computing Environment C.Y. Kong, C.L. Wang, F.C.M. Lau The University of Hong Kong.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
1 reTHINK Deliverables, How To Read reThink deliverables quick starter.
Computational Tools for Population Biology Tanya Berger-Wolf, Computer Science, UIC; Daniel Rubenstein, Ecology and Evolutionary Biology, Princeton; Jared.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Pervasive Computing an Disability: designing for independence? Pam Briggs PaCTLab, Northumbria University Newcastle upon Tyne NE1 8ST
PolicyMorph: Interactive Policy Model Transformations for a Logical ABAC Framework Michael LeMay Omid Fatemieh Carl A. Gunter.
Toward a cooperative programming framework for context-aware applications B. Guo, D. Zhang Telecom. Network and Service Dept. Institut TELECOM SudParis.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: Matthew Dunlop Usable Security – CS 6204 –
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
OWL-S: As a Semantic Mark-up Language for Grid Services By Narendranadh.J.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
INFSO-RI SA2 ETICS2 first Review Valerio Venturi INFN Bruxelles, 3 April 2009 Infrastructure Support.
CIMA and Semantic Interoperability for Networked Instruments and Sensors Donald F. (Rick) McMullen Pervasive Technology Labs at Indiana University
GAS ontology: an ontology for collaboration among ubiquitous computing devices International Journal of Human-Computer Studies (May 2005) Presented By.
Rule-based Context-aware Adaptation Using a Goal-Oriented Ontology Hongyuan Wang (Jilin University, China) Rutvij Mehta (The University of Texas at Dallas,USA)
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Week 2. Conceptual Modeling Models in Engineering Why not English? What is Conceptual Modeling? Origins.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Introduction to Computational Thinking
InterAction Lab, University of Trento
Semantic Web Foundations
How to do an Internal Audit
Jana Diesner, PhD Associate Professor, UIUC
CEng progression through the IOM3
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr Khasymski and Peter Radics Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr Khasymski Peter Radics Virginia Tech Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Outline Introduction Problem Description Proposed Approach Proof of Concept Conclusion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Introduction Introduction of Information Technology in the house. Smart Secure? Sustainable?

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Problem Description Home as a Social Place  Not well studied Technical Constraints and Opportunities  House dynamic social place  Burden of access control decisions  Non-intrusive interaction

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Grounding Scenario Joanne is 75 and lives by herself. Accident. Establishing communication with daughter Helen fails. Contact EMTs and provide relevant information. EMT use provided information to provide prompt help upon arrival.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Proposed Approach

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Ontology Need to model social context  Location  Identity  Time  Activity Need to ground privacy & security in social context

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Policy A policy is a collection of relational statement or rules about concepts defined in the ontology. Example:  In case of emergency, contact family member. If contact is not established, escalate by contacting emergency medical services.  Disclose medical records only to trusted medical providers. Supports sustainable interaction between individuals, while maintaining security and privacy

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Mediator Model interactions as negotiations Burden of sustainable interaction (conflicts)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Proof of Concept Protégé, OWL-DL, SUMO The Protune framework features:  a trust management language supporting (possibly user-defined) actions  an extensible declarative metalanguage for driving decisions about information disclosure  a parameterized negotiation procedure, that gives a semantics to the metalanguage and provably satisfies some desirable properties for all possible metapolicies  general ontology-based techniques for smoothly integrating language extensions  advanced policy explanations in order to answer why, why-not, how-to, and what-if queries

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Ontology

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Conclusion Technological developments bring ubiquitous computing into the home. Complex social structures may hinder deployment of technology. We hope to fully implement and deploy our framework within the lumenHAUS, to further gain insight.