skip to main content
10.1145/2459976.2460006acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Gesture-oriented data sharing

Published: 08 January 2013 Publication History

Abstract

Recently, Natural User Interface (NUI) devices have emerged as viable tools for business task completion and information exchange. When introduced into a collaborative environment, new security implications arise as the traditional relationships between users and devices change. Unique variables are introduced such as gesture patterns, spatial location, and more. Security policies would need to reflect the relationships between not only users and devices, but also these new modalities. This paper describes an extensible platform developed to foster collaboration through natural user interfaces. It also discusses specific components that have opened research avenues into workflow semantics studies and persistent authentication mechanisms for such environments.

References

[1]
Z. Harbort. Presentation: Creative access control mechanisms and policies for collaborative environments. In AAAS-SWARM 2012 Annual Meeting, 2012.
[2]
Z. Harbort and D. Greer. Identity issues in collaborative natural user interface environments. In ID360: The Global Forum on Identity, 2012.
[3]
K. Hubert. Tablet demand and disruption: Mobile users come of age. Technical report, Morgan Stanley, February 2011.
[4]
A. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. Circuits and Systems for Video Technology, IEEE Transactions on, 14(1):4--20, 2004.
[5]
F. Monrose and A. Rubin. Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security, pages 48--56. ACM, 1997.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 86
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media