skip to main content
10.1145/2523514.2523612acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
extended-abstract

Authorized! access denied, unauthorized! access granted

Published: 26 November 2013 Publication History

Abstract

Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening. To address the limitation of current access control systems, we propose an access control method that is based on feelings which relates an access decision to the current detected emotion of the user, and map it to a category of feelings. Feelings categories are either negative resulting in denying access, or positive leading to access being granted. The proposed emotion-based access control (EBAC) mechanism adds the feelings sensation to the access control machines by analyzing the requesters' current brain signals at the time of access request to detect their current emotions, and then grants or denies access.

References

[1]
Pham, T. and Tran, D., Emotion Recognition Using the Emotiv EPOC Device, Neural Information Processing, Lecture Notes in Computer Science, Volume 7667, 2012, pp 394--399.
[2]
Affectiva, emotion detection based on facial expressions, Retrieved on 2013-06-15: http://www.affectiva.com.
[3]
Utopy, Text and voice analysis technology, Retrieved on 2013-06-15: http://www.utopy.com
[4]
Nemesysco, Voice analysis technology. Retrieved on 2013-06-15: http://www.nemesysco.com.
[5]
Elkins, A., Burgoon, J., and Nunamaker, J., Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential, Homeland Security Affairs. Available at http://www.hsaj.org/?special:fullarticle=0.4.1.
[6]
Necomimi, selected TIME MAGAZINE / The 50 best invention of the year. Neurowear.com. Retrieved on 2013-06-19.
[7]
IntendiX-SOCI, g.tec Introduces Mind-controlled Computer Gaming at CeBIT2012. PR Newswire. 5 March 2012.
[8]
Mikhail, M., El-Ayat, K., El Kaliouby, R., Coan, J. and Allen, J., Emotion detection using noisy EEG data, AH '10 Proceedings of the 1st Augmented Human International Conference. 2010.
[9]
Ko, K, Yang, H. and Sim, K., Emotion recognition using EEG signals with relative power values and Bayesian network, International Journal of Control, Automation and Systems, 2009
[10]
Murugappan, M., Rizon, M., Nagarajan, R., Yaacob, S., Hazry, D. and Zunaidi, I., Time-Frequency Analysis of EEG Signals for Human Emotion Detection, BIOMED 2008 25--28.
[11]
Maringer, M. Krumhuber, E., Fischer, A., and Niedenthal, P. M. Beyond smile dynamics: Mimicry and beliefs in judgments of smiles. Emotion, 11, 181--187. 2011.
[12]
Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuits Systems Video Technol. 14 (1) (2004) 4--20
[13]
M. Guennoun, N. Abbad, J. Talom, Sk. Md. M. Rahman, and K. El-Khatib, Continuous Authentication by Electrocardiogram Data. IEEE TIC-STH 2009.
[14]
Abdullah, M. K., Subari, K. S., Loong, J. L. C. and Ahmad, N. N., Analysis of effective channel placement for an EEG-based biometric system, Biomedical Engineering and Sciences (IECBES), 2010 IEEE EMBS Conference on 2010, Page(s): 303--306.
[15]
Zúquete, A., Quintela, B. and Silva Chuna, J. P., Biometric authentication using brain responses to visual stimuli, Biosignals 2010.
[16]
Miyamoto, C., Baba, S., and Nakanishi, I., Biometric person authentication using new spectral features of electroencephalogram (EEG), Intelligent Signal Processing and Communications Systems, 2008. ISPACS 2008.
[17]
Emotiv EPOC, Retrieved on 2013-05-19: http://emotiv.wikia.com/wiki/Emotiv_EPOC.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
November 2013
483 pages
ISBN:9781450324984
DOI:10.1145/2523514
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • Macquarie U., Austarlia
  • MNIT: Malaviya National Institute of Technology
  • Aksaray Univ.: Aksaray University
  • SFedU: Southern Federal University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2013

Check for updates

Author Tags

  1. EEG
  2. access control
  3. access denied
  4. access granted
  5. authorized
  6. brain signals
  7. electroencephalogram
  8. emotion detection
  9. unauthorized

Qualifiers

  • Extended-abstract

Conference

SIN '13
Sponsor:
  • MNIT
  • Aksaray Univ.
  • SFedU

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)2
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media