UM  > 科技學院  > 電腦及資訊科學系
Smart card-based identification and access control model with real-time suspicious action detection mechanism
Leong A.2; Fong S.2; Siu S.1
2004-12-01
Conference NameIASTED International Conference on Artificial Intelligence and Applications
Source PublicationProceedings of the IASTED International Conference. Applied Informatics
Pages794-805
Conference DateFEB 16-18, 2004
Conference PlaceInnsbruck, AUSTRIA
PublisherACTA PRESS, B6, STE 101, 2509 DIEPPE AVE SW, CALGARY, ALBERTA T3E 7J9, CANADA
Abstract

This paper describes a smart-card based solution that further extends the concept of static access control list by performing real-time analysis over user's access patterns, thus allowing early detection of abnormal card usages. A list of irregular behaviors are identified and classified to formulate a logical model by using pure empirical analysis. Based on this model, a real-time suspicious action detection prototype is developed, allowing rapid alert and reaction towards irregular behaviors. The later part of this paper will focus on data analysis over access information of either identified or anonymous user. Results can be used to refine the logical model and reveal user consumption behavior information for marketing purpose as well. Finally, example scenarios on some applications on electronic commerce are discussed.

KeywordContact-tracing Intrusion Diction Real-time System Smart-card
URLView the original
Indexed BySCI
Language英语
WOS Research AreaComputer Science
WOS SubjectComputer Science, Artificial Intelligence
WOS IDWOS:000228622100137
Fulltext Access
Citation statistics
Cited Times [WOS]:0   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Affiliation1.Max Planck Institut für Informatik
2.Univ Macau, Fac Sci & Technol, Macao, Peoples R China
First Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Leong A.,Fong S.,Siu S.. Smart card-based identification and access control model with real-time suspicious action detection mechanism[C]:ACTA PRESS, B6, STE 101, 2509 DIEPPE AVE SW, CALGARY, ALBERTA T3E 7J9, CANADA,2004:794-805.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Leong A.]'s Articles
[Fong S.]'s Articles
[Siu S.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Leong A.]'s Articles
[Fong S.]'s Articles
[Siu S.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Leong A.]'s Articles
[Fong S.]'s Articles
[Siu S.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.