Filters








1,066 Hits in 7.6 sec

Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach [article]

A S M Kayes, Johanna Rahayu, Tharam Dillon, E Chang, J Han
2020
Using our formal approach, we combine the fuzzy model with an ontology-based approach that captures such contextual conditions and incorporates them into the policies, utilizing the ontology languages  ...  Towards this goal, this paper introduces an approach to Context-Aware Access Control using Fuzzy logic (FCAAC) for information resources.  ...  (C1) Formal Access Control Approach: We introduce a new form of access control approach, Context-Aware Access Control using Fuzzy logic (FCAAC), specifically addressing the following aspects: (i) Context  ... 
doi:10.26181/5faa038137d64 fatcat:ecf4iic4pzfeto6bqwuc4p7rlm

Fuzzy CARA - A Fuzzy-Based Context Reasoning System For Pervasive Healthcare

Bingchuan Yuan, John Herbert
2012 Procedia Computer Science  
This paper presents a fuzzy-logic based context model and a related context-aware reasoning middleware that provides a personalized, flexible and extensible reasoning framework for CARA.  ...  Noteworthy about the work is the use of fuzzy-logic to deal with the imperfections of the data, and the use of both structure and hierarchy to control the application of rules in the context reasoning  ...  To achieve that in the CARA system, we adopted a rule-based approach based on fuzzy logic for context reasoning.  ... 
doi:10.1016/j.procs.2012.06.047 fatcat:rsifcmljkndobjvgny5wtajpxy

An adaptive rule-based approach for managing situation-awareness

Mario G.C.A. Cimino, Beatrice Lazzerini, Francesco Marcelloni, Alessandro Ciaramella
2012 Expert systems with applications  
In this framework, we propose a robust and general rule-based approach to manage situation awareness.  ...  We adopt Semantic Web reasoning, fuzzy logic modeling, and genetic algorithms to handle, respectively, situational/contextual inference, uncertain input processing, and adaptation to the user's behavior  ...  Acknowledgements This work was partially supported by the MOVAS Lab, a joint project at the University of Pisa between academy and industry. The authors would like to thank the company Softec S.p.a.  ... 
doi:10.1016/j.eswa.2012.03.014 fatcat:2cmnn4dblrczfolma4rabj6psi

SoK: Context and Risk Aware Access Control for Zero Trust Systems

Shiyu Xiao, Yuhang Ye, Nadia Kanwal, Thomas Newe, Brian Lee
2022 Security and Communication Networks  
In this SoK, we conduct a systematic examination of ZT, context awareness, and risk-based access control to explore the critical elements of each and to identify areas of overlap and synergy to enhance  ...  The idea has been incorporated into several access control models. However, the overlap between context-aware access control and zero-trust security has not been fully explored.  ...  Acknowledgments is publication has emanated from research conducted with the financial support of Athlone Institute of Technology under its President's Seed Fund (2021) and Science Foundation Ireland (  ... 
doi:10.1155/2022/7026779 doaj:60015777aaca454da3936bb936057edd fatcat:ccz4stgo3vgf5pr6cpzyatu2xu

Multimodality in Pervasive Environment [chapter]

Marco Anisetti, Valerio Bellandi, Paolo Ceravolo, Ernesto Damiani
2010 Smart Innovation, Systems and Technologies  
Multimodal interfaces combined with social computing interactions and high-performance networking can foster a new generation of pervasive environments.  ...  Future pervasive environments are expected to immerse users in a consistent world of probes, sensors and actuators.  ...  In the logics-based approach to access control policy evaluation [19] , evaluating a policy means computing an inference.  ... 
doi:10.1007/978-3-642-14619-0_24 fatcat:aetz5njidzha5gol2lyq4w3mne

Context-Aware End-User Development Review

Victor Ponce, Bessam Abdulrazak
2022 Applied Sciences  
In this paper, we present our analysis of existing EUD approaches for building context-aware applications. We present a literature review of 37 screened papers obtained from research databases.  ...  One approach is end-user development (EUD)—a set of activities and development tools that considers non-software experts as application builders.  ...  The control rules follow three modes: form-based, editor-based, and advanced for using an SCL graphical editor, SCL text editor, and fuzzy logic (without SCL), respectively.  ... 
doi:10.3390/app12010479 fatcat:ekxdewn54rg4fd3iroevgid73i

A survey on ontologies for human behavior recognition

Natalia Díaz Rodríguez, M. P. Cuéllar, Johan Lilius, Miguel Delgado Calvo-Flores
2014 ACM Computing Surveys  
After that, Section 1.2 discusses context awareness tools to motivate the deeper analysis of ontologies in this survey.  ...  Both the environment and the user can be provided with semantics to help in the context definition process.  ...  Competitiveness, and the project Development of an Intelligent System for Behaviour Detection and Control in a Tagged World (TIN2009-14538-C02-01).  ... 
doi:10.1145/2523819 fatcat:kvlfg5ghsfgpbewnbebhpakk4i

Context-aware hybrid reasoning framework for pervasive healthcare

Bingchuan Yuan, John Herbert
2013 Personal and Ubiquitous Computing  
Noteworthy about the work is the use of Case Based Reasoning(CBR) to detect conditional anomalies for home automation, and the use of hierarchical Fuzzy Rule Based Reasoning(FRBR) to deal with exceptions  ...  We study how the incorporation of rule-based and case-based reasoning enables CARA to become more robust and to adapt to a changing environment by continuously retraining with new cases.  ...  In this paper we present a novel approach that combines context awareness, case-based reasoning, and general domain knowledge in a healthcare reasoning framework.  ... 
doi:10.1007/s00779-013-0696-5 fatcat:fr6c76hpdbeilmzpyscjxziaqy

A fuzzy ontology for semantic modelling and recognition of human behaviour

Natalia Díaz Rodríguez, Manuel P. Cuéllar, Johan Lilius, Miguel Delgado Calvo-Flores
2014 Knowledge-Based Systems  
As a result, we demonstrate that the inclusion of fuzzy concepts and relations in the ontology provide benefits during the recognition process with respect to crisp approaches.  ...  We provide a proof of concept of the approach in work scenarios such as the office domain, and also make experiments to emphasize the benefits of our approach with respect to crisp ontologies.  ...  We also thank Fernando Bobillo and Robin Wikström for their advice with FuzzyOWL and fuzzyDL tools.  ... 
doi:10.1016/j.knosys.2014.04.016 fatcat:fjkpauxkqffp5hcm7nxji56shu

Survey of Context Information Fusion for Sensor Networks based Ubiquitous Systems [article]

Vijay Borges, Wilson Jeberson
2013 arXiv   pre-print
Sensor Networks produce a large amount of data. According to the needs this data requires to be processed, delivered and accessed.  ...  This processed data when made available with the physical device location, user preferences, time constraints; generically called as context-awareness; is widely referred to as the core function for ubiquitous  ...  Acknowledgments The authors would like to thank Almighty God, our families and Prof R.  ... 
arXiv:1309.0598v1 fatcat:g63i27ldhnfmpc7nlszuvumqve

Translating user preferences into fuzzy rules for the automatic selection of services

Ioana Sora, Doru Todinca, Catalin Avram
2009 2009 5th International Symposium on Applied Computational Intelligence and Informatics  
Our approach consists of a Domain ontology for the service description vocabulary, and a trader that facilitates user-preference-based service selection, combining imperfect service matching and ranking  ...  The novelty of our approach lies in the fact that we automatically generate fuzzy rules starting from individual user preferences and use them in a fuzzy inference process that ranks the service candidates  ...  Fuzzy logic is a solution for both the computational complexity and the matching with imprecise QoS constraints. An overview of fuzzy approaches is presented in [16] .  ... 
doi:10.1109/saci.2009.5136299 dblp:conf/saci/SoraTA09 fatcat:gotggoismff3jdwihaf7efzltu

Survey of context information fusion for ubiquitous Internet-of-Things (IoT) systems

Vijay Borges
2016 Open Computer Science  
Sensor Networks produce a large amount of data. According to the needs this data requires to be processed, delivered and accessed.  ...  In this paper we try and explore different context information fusion techniques by comparing a large number of solutions, their methods, architectures and models.  ...  Work on this project is funded by the research grant through Computer Society of India vide their grant no 1-14/2013-09 dated 21/03/2013.  ... 
doi:10.1515/comp-2016-0003 fatcat:gxyqpdmpdbetpey3ufrzoe4l6y

"Contextualized VGI" Creation and Management to Cope with Uncertainty and Imprecision

Gloria Bordogna, Luca Frigerio, Tomáš Kliment, Pietro Brivio, Laure Hossard, Giacinto Manfron, Simone Sterlacchini
2016 ISPRS International Journal of Geo-Information  
Furthermore, an approach to cope with both ill-defined knowledge and volunteer's uncertainty or imprecise observations is defined based on a fuzzy ontology with uncertainty level-based approximate reasoning  ...  Specifically, various aspects of imprecision and uncertainty of VGI are outlined and, to cope with them, a knowledge-based approach is suggested based on the creation and management of "contextualized  ...  • The ex-ante approaches have the objective of providing the volunteers with easy to access resources for a correct and constrained creation of VGI and automatic mechanism for controlling the data entry  ... 
doi:10.3390/ijgi5120234 fatcat:xjhezfuwxrhpreseeaftzkuw4q

A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues

A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara
2020 Sensors  
With the aim of reducing administrative and computational overheads in the IoT sensor networks, we propose a new generation of Fog-Based Context-Aware Access Control (FB-CAAC) framework, combining the  ...  We present different taxonomies, such as contextual conditions and authorization models, based on the key issues in this area and discuss the existing context-sensitive access control approaches to tackle  ...  [86] have proposed a fuzzy RBAC approach to deal with access control-specific imprecise information through fuzzy relations.  ... 
doi:10.3390/s20092464 pmid:32349242 fatcat:77owmk23lbej5aqyllwkcmoxt4

A Rule-based Service Customization Strategy for Smart Home Context-Aware Automation

Z. Meng, J. Lu
2016 IEEE Transactions on Mobile Computing  
This work presents a rule-based service customization strategy which employs a semantic distance-based rule matching method for context-aware service decision making and a Rough Set Theory-based rule generation  ...  A prototype smart home system is implemented based on smartphones and commercially available low-cost sensors and embedded electronics.  ...  Peer investigations prefer ontology-based context modeling in several modeling approaches [45] .  ... 
doi:10.1109/tmc.2015.2424427 fatcat:hjnj54ghz5c6xeqa5ksqhusgii
« Previous Showing results 1 — 15 out of 1,066 results