RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators

Author(s):  
Ahmad Samer Wazan ◽  
David W. Chadwick ◽  
Remi Venant ◽  
Romain Laborde ◽  
Abdelmalek Benzekri
Keyword(s):  
i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2021 ◽  
pp. 107755872110189
Author(s):  
Laura M. Keohane ◽  
Zilu Zhou ◽  
David G. Stevenson

To coordinate Medicare and Medicaid benefits, multiple states are creating opportunities for dual-eligible beneficiaries to join Medicare Advantage Dual-Eligible Special Needs Plans (D-SNPs) and Medicaid plans operated by the same insurer. Tennessee implemented this approach by requiring insurers who offered Medicaid plans to also offer a D-SNP by 2015. Tennessee’s aligned D-SNP participation increased from 7% to 24% of dual-eligible beneficiaries aged 65 years and above between 2011 and 2017. Within a county, a 10-percentage-point increase in aligned D-SNP participation was associated with 0.3 fewer inpatient admissions ( p = .048), 13.9 fewer prescription drugs per month ( p = .048), and 0.3 fewer nursing home users ( p = .06) per 100 dual-eligible beneficiaries aged 65 years and older. Increased aligned plan participation was associated with 0.2 more inpatient admissions ( p = .004) per 100 dual-eligible beneficiaries younger than 65 years. For some dual-eligible beneficiaries, increasing Medicare and Medicaid managed plan alignment has the potential to promote more efficient service use.


2008 ◽  
Vol 17 (04) ◽  
pp. 523-554 ◽  
Author(s):  
PABLO GOTTHELF ◽  
ALEJANDRO ZUNINO ◽  
MARCELO CAMPO

Many advances have been done to allow groups of people to work together and collaborate in the Internet. Collaborative systems are characterized by the way participants interact. In many cases, equal standing members should cooperate in a non-authoritative environment, where no entity or authority is or should be in charge of regulating the group. Therefore, decentralized communication infrastructures have been hailed as promising alternatives. Recently, decentralized infrastructures based on P2P approaches have drawn the attention of the research community because of their benefits in terms of scalability, robustness, availability and potentials for leveraging computational resources distributed across the Internet. In this paper, a scalable peer-to-peer (P2P) communication Infrastructure for groupware applications is presented. It enables a large number of people to join and cooperate in a robust, decentralized and easy deployable way, without requiring high capacity servers or any other special network infrastructure. The communication infrastructure is based on a binary tree as overlay structure, which implements all groupware communication functionality, including membership management and packet forwarding, at application level, making it an inexpensive and fast deployable solution for equal standing members, such as home users with a domestic connection to the Internet. Two applications, one for synchronous groupware and the other for asynchronous collaboration, have been developed to validate the approach. Comparisons with other communication infrastructures in aspects such as end-to-end propagation delay, group latency, throughput, protocol overhead, failure recovery and link stress, show that our approach is a scalable and robust alternative.


2016 ◽  
Vol 9 (3) ◽  
Author(s):  
Jon Ram Bruun-Pedersen ◽  
Stefania Serafin ◽  
Lise Busk Kofoed

With increasing age, muscle strength decreases excessively rapidly if physical activity is not maintained. However, physical activity is increasingly difficult with aging. This is due to balance, strength or coordination difficulties, arthritis, etc. Moreover, many nursing home residents become unable to experience natural surroundings. Augmenting a conventional biking exercise with a recreational virtual environment (RVE) has shown to serve as an intrinsic motivation contributor to exercise for nursing home residents. RVEs might be able to provide some of the health benefits that regular nature experiences do. More studies on content of proper custom designs for RVEs are necessary. This paper reviews the background for RVE design, describes four custom RVE designs for recreational VE exploration and presents user preferences among nursing home users concerning content and other pivotal design considerations.


2019 ◽  
Author(s):  
Justin Fanelli ◽  
John Waxler

Hundreds of thousands of home users are victimized by cyber-attacks every year. Most experts agree that average home users are not doing enough to protect their computers and their information from cyber-attacks. Improperly managed home computers can lead to individuals losing data, systems performing slowly, loss of identity, and ransom payments; en masse attacks can act in concert to infect personal computers in business and government. Currently, home users receive conflicting guidance for a complicated terrain, often in the form of anecdotal 'Top 10' lists, that is not appropriate for their specific needs, and in many instances, users ignore all guidance. Often, these popular ‘Top 10’ lists appear to be based solely on opinion. Ultimately, we asked ourselves the following: how can we provide home users with better guidance for determining and applying appropriate security controls that meet their needs and can be verified by the cyber security community? In this paper, we propose a methodology for determining and prioritizing the most appropriate security controls for home computing. Using Multi Criteria Decision Making (MCDM) and subject matter expertise, we identify, analyze and prioritize security controls used by government and industry to determine which controls can substantively improve home computing security. We apply our methodology using examples to demonstrate its benefits.


Author(s):  
Hanghang Tong ◽  
Mingjing Li ◽  
Hong-Jiang Zhang ◽  
Jingrui He ◽  
Changshui Zhang
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document