[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2069131.2069146acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

CARS-AD: a context-aware recommender system to decide about implicit or explicit authentication in ubihealth

Published: 31 October 2011 Publication History

Abstract

Mobile devices using traditional authentication processes are vulnerable and inadequate. New approaches must be considered for solving this problem: environmental characteristics, device limitations and information obtained from sensors. This paper presents a recommendation system approach for information systems based on user behavior and information context in which the users are located. The recommendation system has been defined and deployed through filtering processes (content-based, collaborative and hybrid). The behavior is defined by the events and the actions that comprise the user activities. The experimental results indicate: (i) a more dynamic and autonomic mechanism for authenticating users in a pervasive mobile environment, and (ii) an efficiency improvement in detecting anomalies on authentication by using a similarity model and space-time permutation.

References

[1]
J. Al-Jaroodi, A. Al-Dhaheri, F. Al-Abdouli, and N. Mohamed. A Survey of Security Middleware for Pervasive and Ubiquitous Systems. In Network-Based Information Systems, 2009. NBIS'09. International Conference on, volume 0, pages 188--193. IEEE, 2009.
[2]
I. Augustin, A. Yamin, L. da Silva, R. Real, G. Frainer, and C. Geyer. ISAMadapt: abstractions and tools for designing general-purpose pervasive applications. Software: Practice and Experience, 36(11-12):1231--1256, 2006.
[3]
R. Burke. Hybrid web recommender systems. In P. Brusilovsky, A. Kobsa, and W. Nejdl, editors, The adaptive web, volume 4321 of Lecture Notes in Computer Science, pages 377--408. Springer-Verlag, 2007.
[4]
J. Cassens and A. Kofod-Petersen. Using activity theory to model context awareness: a qualitative case study. In Proceedings of the 19th International Florida Artificial Intelligence Research Society Conference, Florida, USA, AAAI Press, pages 619--624, 2006.
[5]
A. Dey. Understanding and using context. Personal and ubiquitous computing, 5(1):4--7, 2001.
[6]
G. Johnson. Towards shrink-wrapped security: A taxonomy of security-relevant context. In Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on, pages 1--2, Galveston, TX, 2009. IEEE.
[7]
J. Kim, C. Song, T. Kim, K. Rim, and J. Lee. Secure and Efficient Recommendation Service of RFID System Using Authenticated Key Management. In Ubiquitous Information Technologies & Applications, 2009. ICUT'09. Proceedings of the 4th International Conference on, pages 1--5. IEEE, 2009.
[8]
M. Kulldorff. SaTScan: software for the spatial, temporal, and space-time scan statistics, version 5.1 {computer program}. Inf Manag Serv, 2005.
[9]
J. Lima, C. Rocha, and M. Dantas. An authentication approach based on behavioral profiles. In Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on, pages 1--4, Santiago de Compostela, Spain, 2010. IEEE.
[10]
D. McDonald. Ubiquitous recommendation systems. Computer, 36:111, 2003.
[11]
M. Munoz-Organero, G. A. Ramiez-Gonzalez, P. J. Munoz-Merino, and C. D. Kloos. A collaborative recommender system based on space-time similarities. IEEE Pervasive Computing, 9:81--87, 2010.
[12]
K. Oku, S. Nakajima, J. Miyazaki, S. Uemura, H. Kato, and F. Hattori. A Recommendation System Considering Users' Past/Current/Future Contexts. ids.csom.umn.edu, pages 3--7, 2010.
[13]
S. Ray and A. Mahanti. Strategies for effective shilling attacks against recommender systems. Privacy, Security, and Trust in KDD, 5456:111--125, 2009.
[14]
F. Ricci. Mobile recommender systems. Information Technology and Tourism, 12(3):205--231, 2011.
[15]
F. Ricci and Q. Nguyen. Acquiring and revising preferences in a critique-based mobile recommender system. IEEE Intelligent Systems, 22:22--29, 2007.
[16]
F. Ricci, L. Rokach, and B. Shapira. Introduction to Recommender Systems Handbook. Recommender Systems Handbook, pages 1--35, 2011.
[17]
M. Roberts, N. Ducheneaut, B. Begole, K. Partridge, B. Price, V. Bellotti, A. Walendowski, and P. Rasmussen. Scalable architecture for context-aware activity-detecting mobile recommendation systems. In World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on a, pages 1--6. IEEE, 2008.
[18]
C. C. Rocha. A Context-Aware Authentication Approach Based on Behavioral Definitions. Master's thesis, Federal University of Santa Catarina, Florianopolis, SC, Brazil, 2010.
[19]
J. Romero-Mariona, H. Ziv, and D. Richardson. SRRS: a recommendation system for security requirements. In Proceedings of the 2008 international workshop on Recommendation systems for software engineering, pages 50--52. ACM, 2008.
[20]
G. Salton. Automatic Text Processing: the transformation, analysis, and retrieval of information by computer, 1989. Reading, MA: Addison-Wesley, 1989.
[21]
L. Uden. Activity theory for designing mobile learning. International Journal of Mobile Learning and Organisation, 1(1):81--102, 2007.
[22]
H. van der Heijden, G. Kotsis, and R. Kronsteiner. Mobile Recommendation Systems for Decision Making. Mobile Business, International Conference on, 0:137--143, 2005.
[23]
J. Zhan, C. Hsieh, I. Wang, T. Hsu, C. Liau, and D. Wang. Privacy-preserving collaborative recommender systems. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 40(4):472--476, 2010.

Cited By

View all
  • (2019)A Survey on Adaptive AuthenticationACM Computing Surveys10.1145/333611752:4(1-30)Online publication date: 11-Sep-2019
  • (2013)A method for improving mobile authentication using human spatio-temporal behavior2013 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2013.6754964(000305-000311)Online publication date: Jul-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiWac '11: Proceedings of the 9th ACM international symposium on Mobility management and wireless access
October 2011
218 pages
ISBN:9781450309011
DOI:10.1145/2069131
  • General Chair:
  • Jose Rolim,
  • Program Chairs:
  • Jun Luo,
  • Sotiris Nikoletseas
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. behavioral model
  3. context-aware recommender system
  4. spatio-temporal analysis

Qualifiers

  • Research-article

Conference

MSWiM '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 83 of 272 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)A Survey on Adaptive AuthenticationACM Computing Surveys10.1145/333611752:4(1-30)Online publication date: 11-Sep-2019
  • (2013)A method for improving mobile authentication using human spatio-temporal behavior2013 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2013.6754964(000305-000311)Online publication date: Jul-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media