Papers by Mahsa Teimourikia
With the advent of cheap image and depth sensors like Kinect, vision-based pose and gesture recog... more With the advent of cheap image and depth sensors like Kinect, vision-based pose and gesture recognition have been increasingly used for different purposes. The use of keyboard and mouse and in general traditional input devices have always been an obstacle for older adults to interact with computers. Natural User Interfaces (NUI) such as gestures and hand poses without the need of touching the device seems to be more convenient for these users. However, for elderly or disabled people there are limitations on the movements which may differ from one person to another. In this thesis, the idea is to develop a gesture recognition system using Kinect that can get adapted to a specific person's abilities in performing poses and gestures for Human Computer Interaction. Gesture recognition systems have been improved greatly in the recent years. Yet, they still have many shortcomings to handle special user needs for elderly or disabled user. The approaches proposed for gesture recognition...
Future Generation Computer Systems, 2015
Fourth edition of the International Conference on the Innovative Computing Technology (INTECH 2014), 2014
ABSTRACT In monitored environments, where risks can be prevented via sensors and spatial data tec... more ABSTRACT In monitored environments, where risks can be prevented via sensors and spatial data technologies, security rules, in particular access control rules, should be made adaptive to the situation at hand at run time. The paper presents adaptive access controls suitable for “smart environments”, based on the Attribute-based Access Control paradigm. Risks are notified by monitoring devices and managed by a Risk Management System, which is illustrated. To adapt the access control decisions to risk mitigation needs, security policies are defined to dynamically activate or deactivate access rules according to the operations required to manage the risks.
Lecture Notes in Computer Science, 2014
Lecture Notes in Business Information Processing, 2014
2014 IEEE 23rd International WETICE Conference, 2014
24th International Conference on Enabling Technologies: Infrastructures for Collaborative Enterprises, Jun 2015
This paper describes the cooperative interface of RAMIRES, a prototype web application where envi... more This paper describes the cooperative interface of RAMIRES, a prototype web application where environmental risks are reported in a dashboard for the risk management team. It shows monitored areas, supports risk managers in understanding the risk and its consequences, and supports decision making so empowering risk managers to mitigate risks improving the environment resilience. To treat risks, RAMIRES is adaptive regarding risk and security. For risk, it adapts the information towards the environment to obtain more data about the observed area to understand the risk and its consequences. It also adapts the user interface according to the involved actor. For security, RAMIRES is adaptive in that security rules determine the data views to different actors. The tool interaction with the environment and with risk mangers is presented using storyboards of interactions.
Innovative Computing Technology (INTECH), 2014 Fourth International Conference on, 2014
In monitored environments, where risks can be prevented via sensors and spatial data technologie... more In monitored environments, where risks can be prevented via sensors and spatial data technologies, security rules, in particular access control rules, should be made adaptive to the situation at hand at run time. The paper presents adaptive access controls suitable for “smart environments”, based on the Attribute-based Access Control paradigm. Risks are notified by monitoring devices and managed by a Risk Management System, which is illustrated. To adapt the access control decisions to risk mitigation needs, security policies are defined to dynamically activate or deactivate access rules according to the operations required to manage the risks.
Risk in smart environments and adaptive access control. Available from: https://www.researchgate.net/publication/267330851_Risk_in_smart_environments_and_adaptive_access_control [accessed May 18, 2015].
Information Systems for Crisis Response and Management in Mediterranean Countries, Springer International Publishing, pp. 98-111, 2014, Oct 2014
This paper presents adaptive access control for areas where risks require modifying authorization... more This paper presents adaptive access control for areas where risks require modifying authorizations dynamically at run time to enlarge and/or restrict privileges for risk rescue teams. Resources, which have a spatial description, as well as data elements of the areas to be protected, are considered. Based on a risk scenario, principles of access control based on the ABAC (Attribute Based Access Control) model for Subjects and Objects are given. Adaptivity of access control rules apply to subjects who intervene in the risk area and who require enlarged privileges to access to resources. The Access Control Domain concept models the policies of adaptive changes to Subject/Object attributes to face the crisis events. Events have a spatial description to enable managing the crisis according to where the event has occurred, since the same event can have different impacts on the environment depending on where it happens.
Database and Expert Systems Applications, Springer International Publishing, 2014
This paper presents the design principles for adaptive security for areas where changing conditio... more This paper presents the design principles for adaptive security for areas where changing conditions trigger events signaling risks that might require modifying authorizations of risk management teams. Spatial resources and information of the areas to be protected are considered in sample scenarios, and principles of security design are introduced building on ABAC (Attribute Based Access Control). Adaptivity of security rules applying to subjects who intervene in the risk area is the core of our security model so as to make it responsive to risks by dynamically granting privileges to subjects to access resources.
WETICE Conference (WETICE), 2014 IEEE 23rd International, 2014
This paper presents the design principles for dynamic security modeling in risk-prone environment... more This paper presents the design principles for dynamic security modeling in risk-prone environments, where elements of the environment to be protected are classified in Contexts and are monitored and geo-referenced. Based on a motivating scenario, the security model elements are introduced building on the ABAC (Attribute Based Access Control) paradigm. Dynamicity is integrated into the model to make it self-adaptable to dynamic changes in the environment conditions, including the occurrence of risks and emergencies. The model aims at dynamically authorizing subjects to access diverse data and physical objects (resources) based on adaptive activation/deactivation of security rules and changes in subject or object attributes, while still preserving the need-to-know principle.
Proceedings of the 2014 International Working Conference on Advanced Visual Interfaces, ACM, May 27, 2014
Gestural interaction leveraging the expressiveness of the human hand, either in touch or in air g... more Gestural interaction leveraging the expressiveness of the human hand, either in touch or in air gestures has been a subject of much research. In this work, a user study focusing mainly on static hand poses has been conducted on a heterogeneous group of participants covering different aspects of this interaction method: role of the participants in the creation of the hand poses, context-free pose-action mapping, learnability and memory issues, and physical comfort. Results of the study are discussed.
Universal Access in Human-Computer Interaction. Aging and Assistive Environments, Springer International Publishing, 2014
Elderly population is growing all over the globe. Novel human-computer interaction systems and te... more Elderly population is growing all over the globe. Novel human-computer interaction systems and techniques are required to fill the gap between elderly reduced physical and cognitive capabilities and the smooth usage of technological artefacts densely populating our environments. Gesture-based interfaces are potentially more natural, intuitive, and direct. In this paper, we propose a personalized hand pose and gesture recognition system (called HANDY) supporting personalized gestures and we report the results of two experiments with both younger and older participants. Our results show that by sufficiently training our system we can get similar accuracies for both younger and older users. This means that our gesture recognition system can accommodate the limitations of an ageing-hand even in presence of hand issues like arthritis or hand tremor.
ACHI 2014, The Seventh International Conference on Advances in Computer-Human Interactions, Mar 23, 2014
With the growing usage of computer systems in daily life, a natural and intuitive Human Computer ... more With the growing usage of computer systems in daily life, a natural and intuitive Human Computer Interaction (HCI) method to support the embedding of computer systems in our environment seems necessary. Gestures are of utmost importance for the design of natural user interfaces. Hand gesture recognition to extract meaningful expressions from the human hand movements and postures is being used for different applications. However, the recognition of hand gestures that contain different hand poses can be challenging. In this paper, we propose a system (called HANDY) for hand gesture recognition that is flexible to be trained to recognize a variety of user-defined gestures defined as sequences of static hand postures. The system has been designed to be used in uncontrolled environments, to handle dynamic and cluttered backgrounds, and without the need of using any wearable sensor or any specific clothing. Evaluation results show a good average accuracy in gesture recognition.
Conference Presentations by Mahsa Teimourikia
The presentation introduces safety risk management in work environments, and a risk model to calc... more The presentation introduces safety risk management in work environments, and a risk model to calculate the personal risk for individual workers with the relation of their distance from the risk source.
This presentation presents the design principles for adaptive security for areas where changing c... more This presentation presents the design principles for adaptive security for areas where changing conditions trigger events signaling risks that might require modifying authorizations of risk management teams. Spatial resources and information of the areas to be protected are considered in sample scenarios, and principles of security design are introduced building on ABAC (Attribute Based Access Control). Adaptivity of security rules apply-ing to subjects who intervene in the risk area is the core of our security model so as to make it responsive to risks by dynamically granting privileges to subjects to access re-sources.
In monitored environments, where risks can be prevented via sensors and spatia... more In monitored environments, where risks can be prevented via sensors and spatial data technologies, security rules, in particular access control rules, should be made adaptive to the situation at hand at run time. The paper presents adaptive access controls suitable for “smart environments”, based on the Attribute-based Access Control paradigm. Risks are notified by monitoring devices and managed by a Risk Management System, which is illustrated. To adapt the access control decisions to risk mitigation needs, security policies are defined to dynamically activate or deactivate access rules according to the operations required to manage the risks.
This presentation presents adaptive access control for areas where risks require modifying autho... more This presentation presents adaptive access control for areas where risks require modifying authorizations dynamically at run time to enlarge and/or restrict privileges for risk rescue teams. Resources, which have a spatial description, as well as data elements of the areas to be protected, are considered. Based on a risk scenario, principles of access control based on the ABAC (Attribute Based Access Control) model for Subjects and Objects are given. Adaptivity of access control rules apply to subjects who intervene in the risk area and who require enlarged privileges to access to resources. The Access Control Domain concept models the policies of adaptive changes to Subject/Object attributes to face the crisis events. Events have a spatial description to enable managing the crisis according to where the event has occurred, since the same event can have different impacts on the environment depending on where it happens.
This paper describes the cooperative interface of RAMIRES, a prototype web application where envi... more This paper describes the cooperative interface of RAMIRES, a prototype web application where environmental risks are reported in a dashboard for the risk management team. It shows monitored areas, supports risk managers in understanding the risk and its consequences, and supports decision making so empowering risk managers to mitigate risks improving the environment resilience. To treat risks, RAMIRES is adaptive regarding risk and security. For risk, it adapts the information towards the environment to obtain more data about the observed area to understand the risk and its consequences. It also adapts the user interface according to the involved actor. For security, RAMIRES is adaptive in that security rules determine the data views to different actors. The tool interaction with the environment and with risk mangers is presented using storyboards of interactions.
Uploads
Papers by Mahsa Teimourikia
Risk in smart environments and adaptive access control. Available from: https://www.researchgate.net/publication/267330851_Risk_in_smart_environments_and_adaptive_access_control [accessed May 18, 2015].
Conference Presentations by Mahsa Teimourikia
Risk in smart environments and adaptive access control. Available from: https://www.researchgate.net/publication/267330851_Risk_in_smart_environments_and_adaptive_access_control [accessed May 18, 2015].
usually tackled separately. The importance of considering safety and
security as dependent aspects and co-engineering them together as
cyber-security is highlighted with the advent of Internet of Things
(IoT) which has a direct or indirect effect on how safety and security
are managed in critical environments.
As an emerging technology, IoT, has provided a promising opportunity in
the appearance of Industry 4.0 and Smart Work Environments (SWEs). As
with all new technologies, SWEs introduce various issues and
opportunities. On one hand, as more devices are getting integrated in
the IoT technology, SWEs become more and more vulnerable to the security
threats. And hence new approaches should be proposed to protect the
sensitive and critical resources in the SWEs. On the other hand, the IoT
technology provides the chance to acquire ambient and monitoring data to
be exploited to identify and treat the risks related to safety. While
this is an advantage to protect persons' safety, the security policies
should allow the treatment of the risks when necessary by adapting to
the safety-related context in each situation.
In this thesis, the security and safety of the risk-prone SWEs are
tackled. Starting with safety, a run-time risk management methodology is
proposed that exploits an automated risk assessment process that is
developed considering the commonly adopted risk assessment techniques in
the industry. In addition, an ontology is designed and developed to
extract safet knowledge in a computer-readable way. Coming to security,
a risk-adaptive Access Control (AC) model based on Attribute-Based
Access Control (ABAC) is developed considering hierarchical
safety-related contexts. Upon receiving risk descriptions, based on the
designed meta-rules, the AC system adapts the security rules to allow
risk treatment.