skip to main content
10.1145/2523514.2523612acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
extended-abstract

Authorized! access denied, unauthorized! access granted

Published:26 November 2013Publication History

ABSTRACT

Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening. To address the limitation of current access control systems, we propose an access control method that is based on feelings which relates an access decision to the current detected emotion of the user, and map it to a category of feelings. Feelings categories are either negative resulting in denying access, or positive leading to access being granted. The proposed emotion-based access control (EBAC) mechanism adds the feelings sensation to the access control machines by analyzing the requesters' current brain signals at the time of access request to detect their current emotions, and then grants or denies access.

References

  1. Pham, T. and Tran, D., Emotion Recognition Using the Emotiv EPOC Device, Neural Information Processing, Lecture Notes in Computer Science, Volume 7667, 2012, pp 394--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Affectiva, emotion detection based on facial expressions, Retrieved on 2013-06-15: http://www.affectiva.com.Google ScholarGoogle Scholar
  3. Utopy, Text and voice analysis technology, Retrieved on 2013-06-15: http://www.utopy.comGoogle ScholarGoogle Scholar
  4. Nemesysco, Voice analysis technology. Retrieved on 2013-06-15: http://www.nemesysco.com.Google ScholarGoogle Scholar
  5. Elkins, A., Burgoon, J., and Nunamaker, J., Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential, Homeland Security Affairs. Available at http://www.hsaj.org/?special:fullarticle=0.4.1.Google ScholarGoogle Scholar
  6. Necomimi, selected TIME MAGAZINE / The 50 best invention of the year. Neurowear.com. Retrieved on 2013-06-19.Google ScholarGoogle Scholar
  7. IntendiX-SOCI, g.tec Introduces Mind-controlled Computer Gaming at CeBIT2012. PR Newswire. 5 March 2012.Google ScholarGoogle Scholar
  8. Mikhail, M., El-Ayat, K., El Kaliouby, R., Coan, J. and Allen, J., Emotion detection using noisy EEG data, AH '10 Proceedings of the 1st Augmented Human International Conference. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ko, K, Yang, H. and Sim, K., Emotion recognition using EEG signals with relative power values and Bayesian network, International Journal of Control, Automation and Systems, 2009Google ScholarGoogle Scholar
  10. Murugappan, M., Rizon, M., Nagarajan, R., Yaacob, S., Hazry, D. and Zunaidi, I., Time-Frequency Analysis of EEG Signals for Human Emotion Detection, BIOMED 2008 25--28.Google ScholarGoogle Scholar
  11. Maringer, M. Krumhuber, E., Fischer, A., and Niedenthal, P. M. Beyond smile dynamics: Mimicry and beliefs in judgments of smiles. Emotion, 11, 181--187. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuits Systems Video Technol. 14 (1) (2004) 4--20 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Guennoun, N. Abbad, J. Talom, Sk. Md. M. Rahman, and K. El-Khatib, Continuous Authentication by Electrocardiogram Data. IEEE TIC-STH 2009.Google ScholarGoogle Scholar
  14. Abdullah, M. K., Subari, K. S., Loong, J. L. C. and Ahmad, N. N., Analysis of effective channel placement for an EEG-based biometric system, Biomedical Engineering and Sciences (IECBES), 2010 IEEE EMBS Conference on 2010, Page(s): 303--306.Google ScholarGoogle ScholarCross RefCross Ref
  15. Zúquete, A., Quintela, B. and Silva Chuna, J. P., Biometric authentication using brain responses to visual stimuli, Biosignals 2010.Google ScholarGoogle Scholar
  16. Miyamoto, C., Baba, S., and Nakanishi, I., Biometric person authentication using new spectral features of electroencephalogram (EEG), Intelligent Signal Processing and Communications Systems, 2008. ISPACS 2008.Google ScholarGoogle Scholar
  17. Emotiv EPOC, Retrieved on 2013-05-19: http://emotiv.wikia.com/wiki/Emotiv_EPOC.Google ScholarGoogle Scholar

Index Terms

  1. Authorized! access denied, unauthorized! access granted

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
        November 2013
        483 pages
        ISBN:9781450324984
        DOI:10.1145/2523514

        Copyright © 2013 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 November 2013

        Check for updates

        Qualifiers

        • extended-abstract

        Acceptance Rates

        Overall Acceptance Rate102of289submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader