Implementing access control to people location information

Author(s):  
Urs Hengartner ◽  
Peter Steenkiste
2011 ◽  
Vol 19 (3) ◽  
pp. 607-637 ◽  
Author(s):  
Heechang Shin ◽  
Vijayalakshmi Atluri ◽  
June-suh Cho

2005 ◽  
Vol 8 (4) ◽  
pp. 424-456 ◽  
Author(s):  
Urs Hengartner ◽  
Peter Steenkiste

2018 ◽  
Vol 7 (2.12) ◽  
pp. 325
Author(s):  
Jae Gwang Lee ◽  
Jae Pil Lee ◽  
Eun Su Mo ◽  
Jun Hyeon Lee ◽  
Ki Su Yoon ◽  
...  

Background/Objectives: With the development of IT, accidents of industrial secret leakage have occurred more than before. Such acci-dents are mostly caused by insiders. Methods/Statistical analysis: An existing access control system uses RFID and NFC tag. The system saves only the final location in-formation in DB. For the reason, it is hard to track a user’s location data in real time. However, a beacon-based access control system saves a user’s location information in DB in real time. By analyzing the location information of DB, it is possible to track a user. Findings: Beacons are used for determining a user’s location. The determined location information is converted into location data which is saved into DB. The location data is converted into coordinates. The converted coordinate data is analyzed for understanding a user’s behavior pattern. In the pattern analysis, if a user takes an abnormal behavior, policy-based response is performed. The user behavior pattern analysis system proposed in this study is able to respond to an accident in real time. Therefore, it is expected to contribute to reducing the number of industrial secret leakage accidents caused by insiders. Improvements/Applications: This study designs a model that analyzes behavior pattern by using the indoor location data of a user based on beacon. 


2001 ◽  
Vol 84 (9) ◽  
pp. 16-26
Author(s):  
Tadao Saito ◽  
Hitoshi Aida ◽  
Terumasa Aoki ◽  
Soichiro Hidaka ◽  
Tredej Toranawigtrai ◽  
...  

2020 ◽  
Vol 20 (3) ◽  
pp. 13-20
Author(s):  
Jinsoo Kim ◽  
◽  
Hyukjin Kwon ◽  
Dongkyoo Shin ◽  
Sunghoon Hong

2012 ◽  
Vol 1 (7) ◽  
pp. 78-79
Author(s):  
Anitha Chepuru ◽  
◽  
Dr.K.Venugopal Rao ◽  
Amardeep Matta
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document