ABSTRACT
Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening. To address the limitation of current access control systems, we propose an access control method that is based on feelings which relates an access decision to the current detected emotion of the user, and map it to a category of feelings. Feelings categories are either negative resulting in denying access, or positive leading to access being granted. The proposed emotion-based access control (EBAC) mechanism adds the feelings sensation to the access control machines by analyzing the requesters' current brain signals at the time of access request to detect their current emotions, and then grants or denies access.
- Pham, T. and Tran, D., Emotion Recognition Using the Emotiv EPOC Device, Neural Information Processing, Lecture Notes in Computer Science, Volume 7667, 2012, pp 394--399. Google ScholarDigital Library
- Affectiva, emotion detection based on facial expressions, Retrieved on 2013-06-15: http://www.affectiva.com.Google Scholar
- Utopy, Text and voice analysis technology, Retrieved on 2013-06-15: http://www.utopy.comGoogle Scholar
- Nemesysco, Voice analysis technology. Retrieved on 2013-06-15: http://www.nemesysco.com.Google Scholar
- Elkins, A., Burgoon, J., and Nunamaker, J., Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential, Homeland Security Affairs. Available at http://www.hsaj.org/?special:fullarticle=0.4.1.Google Scholar
- Necomimi, selected TIME MAGAZINE / The 50 best invention of the year. Neurowear.com. Retrieved on 2013-06-19.Google Scholar
- IntendiX-SOCI, g.tec Introduces Mind-controlled Computer Gaming at CeBIT2012. PR Newswire. 5 March 2012.Google Scholar
- Mikhail, M., El-Ayat, K., El Kaliouby, R., Coan, J. and Allen, J., Emotion detection using noisy EEG data, AH '10 Proceedings of the 1st Augmented Human International Conference. 2010. Google ScholarDigital Library
- Ko, K, Yang, H. and Sim, K., Emotion recognition using EEG signals with relative power values and Bayesian network, International Journal of Control, Automation and Systems, 2009Google Scholar
- Murugappan, M., Rizon, M., Nagarajan, R., Yaacob, S., Hazry, D. and Zunaidi, I., Time-Frequency Analysis of EEG Signals for Human Emotion Detection, BIOMED 2008 25--28.Google Scholar
- Maringer, M. Krumhuber, E., Fischer, A., and Niedenthal, P. M. Beyond smile dynamics: Mimicry and beliefs in judgments of smiles. Emotion, 11, 181--187. 2011.Google ScholarCross Ref
- Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuits Systems Video Technol. 14 (1) (2004) 4--20 Google ScholarDigital Library
- M. Guennoun, N. Abbad, J. Talom, Sk. Md. M. Rahman, and K. El-Khatib, Continuous Authentication by Electrocardiogram Data. IEEE TIC-STH 2009.Google Scholar
- Abdullah, M. K., Subari, K. S., Loong, J. L. C. and Ahmad, N. N., Analysis of effective channel placement for an EEG-based biometric system, Biomedical Engineering and Sciences (IECBES), 2010 IEEE EMBS Conference on 2010, Page(s): 303--306.Google ScholarCross Ref
- Zúquete, A., Quintela, B. and Silva Chuna, J. P., Biometric authentication using brain responses to visual stimuli, Biosignals 2010.Google Scholar
- Miyamoto, C., Baba, S., and Nakanishi, I., Biometric person authentication using new spectral features of electroencephalogram (EEG), Intelligent Signal Processing and Communications Systems, 2008. ISPACS 2008.Google Scholar
- Emotiv EPOC, Retrieved on 2013-05-19: http://emotiv.wikia.com/wiki/Emotiv_EPOC.Google Scholar
Index Terms
- Authorized! access denied, unauthorized! access granted
Recommendations
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsRole-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control ...
Towards Attribute-Centric Access Control: an ABAC versus RBAC argument
Recent developments in attribute-based access control have fueled the conventional debate regarding the pros and cons of Attributes-based access control ABAC versus Role-based access control RBAC. However, existing arguments have been primarily focused ...
Domain Administration of Task-role Based Access Control for Process Collaboration Environments
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01The fast evolving workflow technologies facilitate organizations to interact and cooperate with each other to achieve their business goals by process collaborations. Task-role based access control is an important security mechanism to protect data and ...
Comments