skip to main content
10.1145/3357613.3357636acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Safety analysis of the flow of cartographic data with defects

Published:12 September 2019Publication History

ABSTRACT

The paper considers the flow of cartographic data that arises when solving applied problems by visual analysis of maps, plans or schemes. The flow arises in the process of interactive user-analytics and geographic information services. It is assumed that to solve the task the analyst builds the working area of the analysis, filling it with the necessary objects and relationships. The paper discusses the vulnerability of the analysis process, which is due to the influence of objects with defects on the analyst's situational awareness. An attack using this vulnerability is described. The result of the attack is making inadequate decisions and the occurrence of damage. The paper considers the analysis of the security of the data stream from the geoservice to the client. A model for estimating the allowable level of defects is proposed. A method of analyzing the "characteristic" points of the time series describing the cartographic images in the session is proposed. A method for finding a protective context from a set of contexts used by a server is proposed.

References

  1. P. A. Longley, M. Goodchild, D. J. Maguire and D. W. Rhind, Geographic Information Systems and Sciences, 3rd ed. Wiley, 2011.Google ScholarGoogle Scholar
  2. S. Shashi, X. Hui, Encyclopedia of GIS. New York: SpringerScience+Buisiness Media, LLC, 2008.Google ScholarGoogle Scholar
  3. M.F. Goodchild (2007) Citizens as sensors: the world of volunteered geography. GeoJournal, 69(4), 211--221.Google ScholarGoogle ScholarCross RefCross Ref
  4. https://www.autodesk.com/products/autocad/included-toolsetsGoogle ScholarGoogle Scholar
  5. https://www.esri.com/en-us/arcgis/about-arcgis/overviewGoogle ScholarGoogle Scholar
  6. R. Alguliyev, Y. Imamverdiyev, L. Sukhostat (2018). Cyber-physical systems and their security issues, Computers in Industry, 100(9), 212--223.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Ntalampiras (2016). Automatic identification of integrity attacks in cyber-physical systems, Expert Systems with Applications, 58(10), 164--173.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Z. Lun, A. D'Innocenzo, F. Smarra, I. Malavolta, M. D. Di Benedetto (2019). State of the art of cyber-physical systems security: an automatic control perspective, Journal of Systems and Software, 149(3), 174--216.Google ScholarGoogle Scholar
  9. K. Ooms, G. Andrienko, N. Andrienko, P. De Maeyer, V. Fack (2012). Analysing the spatial dimension of eye movement data using a visual analytic approach, Expert Systems with Applications, 39, 1324--1332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Dey, G. Abowd (2000). Towards a better understanding of context and context-awareness, CHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness, pp. 304--307.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Berndtsson, J. Mellin 2018 Active Database Knowledge Model, Encyclopedia of Database Systems, Liu L., Özsu M.T. (eds). Springer, New York.Google ScholarGoogle Scholar
  12. D. Kotkov, S. Wang, J. Veijalainen (2016). Survey of serendipity in recommender systems. Knowledge-Based Systems, 111(8), 180--192Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Safety analysis of the flow of cartographic data with defects

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '19: Proceedings of the 12th International Conference on Security of Information and Networks
      September 2019
      179 pages
      ISBN:9781450372428
      DOI:10.1145/3357613

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 September 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader