Security, Privacy, and Dependability in Smart Homes: A Pattern Catalog Approach View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2010

AUTHORS

Pierre Busnel , Sylvain Giroux

ABSTRACT

Security, privacy and dependability are crucial issues if one wants to build a real smart home. First, in addition to established home security requirements, smart home adoption requires to solve brand-new security vulnerabilities deriving from the automated facets of smart homes. Thereafter, pervasive computing and ambient intelligence allow to collect a lot of information, to analyze it to derive new facts, and make them explicit. Finally, systems that are usually safe and dependable can fail when their behavior is becoming controlled as the result of complex interactions between many intertwined information systems. Unfortunately, application developers in smart home environments are usually neither security experts, nor familiar with ethical and legal requirements related to privacy. Security patterns can help to anticipate, overcome, and document systematically these difficult issues in building pervasive information systems in smart homes for cognitively impaired people. In this paper, we illustrate how security patterns can be extended and applied to Smart Home to foster autonomy of elderly or cognitively impaired people, then, we sketch the structure of the catalog which will be populated with a few patterns. More... »

PAGES

24-31

Book

TITLE

Aging Friendly Technology for Health and Independence

ISBN

978-3-642-13777-8
978-3-642-13778-5

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-13778-5_4

DOI

http://dx.doi.org/10.1007/978-3-642-13778-5_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1035956232


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Universit\u00e9 de Sherbrooke", 
          "id": "https://www.grid.ac/institutes/grid.86715.3d", 
          "name": [
            "DOMUS lab, University of Sherbrooke, J1K 2R1, Sherbrooke, QC, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Busnel", 
        "givenName": "Pierre", 
        "id": "sg:person.013775433513.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013775433513.58"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Universit\u00e9 de Sherbrooke", 
          "id": "https://www.grid.ac/institutes/grid.86715.3d", 
          "name": [
            "DOMUS lab, University of Sherbrooke, J1K 2R1, Sherbrooke, QC, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Giroux", 
        "givenName": "Sylvain", 
        "id": "sg:person.01140034726.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01140034726.32"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/b11930", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016953588", 
          "https://doi.org/10.1007/b11930"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/b11930", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016953588", 
          "https://doi.org/10.1007/b11930"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/564526.564544", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024208138"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/fgcn.2008.227", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094880438"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.2495/bio030501", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1098493401"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2010", 
    "datePublishedReg": "2010-01-01", 
    "description": "Security, privacy and dependability are crucial issues if one wants to build a real smart home. First, in addition to established home security requirements, smart home adoption requires to solve brand-new security vulnerabilities deriving from the automated facets of smart homes. Thereafter, pervasive computing and ambient intelligence allow to collect a lot of information, to analyze it to derive new facts, and make them explicit. Finally, systems that are usually safe and dependable can fail when their behavior is becoming controlled as the result of complex interactions between many intertwined information systems. Unfortunately, application developers in smart home environments are usually neither security experts, nor familiar with ethical and legal requirements related to privacy. Security patterns can help to anticipate, overcome, and document systematically these difficult issues in building pervasive information systems in smart homes for cognitively impaired people. In this paper, we illustrate how security patterns can be extended and applied to Smart Home to foster autonomy of elderly or cognitively impaired people, then, we sketch the structure of the catalog which will be populated with a few patterns.", 
    "editor": [
      {
        "familyName": "Lee", 
        "givenName": "Yeunsook", 
        "type": "Person"
      }, 
      {
        "familyName": "Bien", 
        "givenName": "Z. Zenn", 
        "type": "Person"
      }, 
      {
        "familyName": "Mokhtari", 
        "givenName": "Mounir", 
        "type": "Person"
      }, 
      {
        "familyName": "Kim", 
        "givenName": "Jeong Tai", 
        "type": "Person"
      }, 
      {
        "familyName": "Park", 
        "givenName": "Mignon", 
        "type": "Person"
      }, 
      {
        "familyName": "Kim", 
        "givenName": "Jongbae", 
        "type": "Person"
      }, 
      {
        "familyName": "Lee", 
        "givenName": "Heyoung", 
        "type": "Person"
      }, 
      {
        "familyName": "Khalil", 
        "givenName": "Ismail", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-13778-5_4", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-13777-8", 
        "978-3-642-13778-5"
      ], 
      "name": "Aging Friendly Technology for Health and Independence", 
      "type": "Book"
    }, 
    "name": "Security, Privacy, and Dependability in Smart Homes: A Pattern Catalog Approach", 
    "pagination": "24-31", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1035956232"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-13778-5_4"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "ab487b20c122c956cc53aa23572b3146fda1341c5fdb9aeca5aa9ebff41261d9"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-13778-5_4", 
      "https://app.dimensions.ai/details/publication/pub.1035956232"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T08:04", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000359_0000000359/records_29212_00000001.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-642-13778-5_4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13778-5_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13778-5_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13778-5_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13778-5_4'


 

This table displays all metadata directly associated to this object as RDF triples.

120 TRIPLES      23 PREDICATES      31 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-13778-5_4 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Nd3a2cc77e2df458f8e00cfeba2bc6b8a
4 schema:citation sg:pub.10.1007/b11930
5 https://doi.org/10.1109/fgcn.2008.227
6 https://doi.org/10.1145/564526.564544
7 https://doi.org/10.2495/bio030501
8 schema:datePublished 2010
9 schema:datePublishedReg 2010-01-01
10 schema:description Security, privacy and dependability are crucial issues if one wants to build a real smart home. First, in addition to established home security requirements, smart home adoption requires to solve brand-new security vulnerabilities deriving from the automated facets of smart homes. Thereafter, pervasive computing and ambient intelligence allow to collect a lot of information, to analyze it to derive new facts, and make them explicit. Finally, systems that are usually safe and dependable can fail when their behavior is becoming controlled as the result of complex interactions between many intertwined information systems. Unfortunately, application developers in smart home environments are usually neither security experts, nor familiar with ethical and legal requirements related to privacy. Security patterns can help to anticipate, overcome, and document systematically these difficult issues in building pervasive information systems in smart homes for cognitively impaired people. In this paper, we illustrate how security patterns can be extended and applied to Smart Home to foster autonomy of elderly or cognitively impaired people, then, we sketch the structure of the catalog which will be populated with a few patterns.
11 schema:editor N22f45e63633a4b848b17c56a1f19bd43
12 schema:genre chapter
13 schema:inLanguage en
14 schema:isAccessibleForFree false
15 schema:isPartOf Nacbfcbb3fba84f6494bb5e370967ce23
16 schema:name Security, Privacy, and Dependability in Smart Homes: A Pattern Catalog Approach
17 schema:pagination 24-31
18 schema:productId N3b702af5c6d6476da6a07a7cb9573ca9
19 Ncb7d71189e89485d9f8733fb78fc4894
20 Nfef4cb30ee5c4802a1944eb3757381fa
21 schema:publisher N088d91b9cd8b4faabed88855f1cce6c6
22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035956232
23 https://doi.org/10.1007/978-3-642-13778-5_4
24 schema:sdDatePublished 2019-04-16T08:04
25 schema:sdLicense https://scigraph.springernature.com/explorer/license/
26 schema:sdPublisher N9fb10feebf6c4a9f95008cddd91f0af3
27 schema:url https://link.springer.com/10.1007%2F978-3-642-13778-5_4
28 sgo:license sg:explorer/license/
29 sgo:sdDataset chapters
30 rdf:type schema:Chapter
31 N088d91b9cd8b4faabed88855f1cce6c6 schema:location Berlin, Heidelberg
32 schema:name Springer Berlin Heidelberg
33 rdf:type schema:Organisation
34 N21ba76c9c00f4c7ebf7a0e30260d7591 schema:familyName Mokhtari
35 schema:givenName Mounir
36 rdf:type schema:Person
37 N22f45e63633a4b848b17c56a1f19bd43 rdf:first Nbc4123a5e1414f168b73c932e3e2fe47
38 rdf:rest N5cabc1fba3bd460ba5ca04cb94251694
39 N3b702af5c6d6476da6a07a7cb9573ca9 schema:name doi
40 schema:value 10.1007/978-3-642-13778-5_4
41 rdf:type schema:PropertyValue
42 N3c53eb88c7d643ed83e958f4419b626d schema:familyName Lee
43 schema:givenName Heyoung
44 rdf:type schema:Person
45 N4b8ba0c6c99a4273af259ec7ad93e24f rdf:first Nf730bd3fa35c407f80c95b5e73e5e0f0
46 rdf:rest Nf221781e9a514412b674dec281197339
47 N4c34e6a8acf7490eb36ee5bee68f9f9b rdf:first Nc00b1e11f42f418c930697a712166f96
48 rdf:rest N4b8ba0c6c99a4273af259ec7ad93e24f
49 N5cabc1fba3bd460ba5ca04cb94251694 rdf:first N6ee47b15313d4526a5839e9cc4f2fb5d
50 rdf:rest N69ea431ac39b44b79f5ccda6c31abea9
51 N69ea431ac39b44b79f5ccda6c31abea9 rdf:first N21ba76c9c00f4c7ebf7a0e30260d7591
52 rdf:rest N4c34e6a8acf7490eb36ee5bee68f9f9b
53 N6ee47b15313d4526a5839e9cc4f2fb5d schema:familyName Bien
54 schema:givenName Z. Zenn
55 rdf:type schema:Person
56 N75a65d8ee4d04f8cb653fec9d95db5b6 rdf:first Ne1b4f7828714423a8b3c05cb150283bf
57 rdf:rest rdf:nil
58 N9fb10feebf6c4a9f95008cddd91f0af3 schema:name Springer Nature - SN SciGraph project
59 rdf:type schema:Organization
60 Nacbfcbb3fba84f6494bb5e370967ce23 schema:isbn 978-3-642-13777-8
61 978-3-642-13778-5
62 schema:name Aging Friendly Technology for Health and Independence
63 rdf:type schema:Book
64 Nb6f501ed194544abbbf76582b61c29a0 rdf:first sg:person.01140034726.32
65 rdf:rest rdf:nil
66 Nbc4123a5e1414f168b73c932e3e2fe47 schema:familyName Lee
67 schema:givenName Yeunsook
68 rdf:type schema:Person
69 Nc00b1e11f42f418c930697a712166f96 schema:familyName Kim
70 schema:givenName Jeong Tai
71 rdf:type schema:Person
72 Ncb7d71189e89485d9f8733fb78fc4894 schema:name readcube_id
73 schema:value ab487b20c122c956cc53aa23572b3146fda1341c5fdb9aeca5aa9ebff41261d9
74 rdf:type schema:PropertyValue
75 Nd3a2cc77e2df458f8e00cfeba2bc6b8a rdf:first sg:person.013775433513.58
76 rdf:rest Nb6f501ed194544abbbf76582b61c29a0
77 Ndf9431d91a4c4d9f9d78bd7b1a59b7ce schema:familyName Kim
78 schema:givenName Jongbae
79 rdf:type schema:Person
80 Ne1b4f7828714423a8b3c05cb150283bf schema:familyName Khalil
81 schema:givenName Ismail
82 rdf:type schema:Person
83 Ne24bccd45c0d47ac919fda1bbbdd3463 rdf:first N3c53eb88c7d643ed83e958f4419b626d
84 rdf:rest N75a65d8ee4d04f8cb653fec9d95db5b6
85 Nf221781e9a514412b674dec281197339 rdf:first Ndf9431d91a4c4d9f9d78bd7b1a59b7ce
86 rdf:rest Ne24bccd45c0d47ac919fda1bbbdd3463
87 Nf730bd3fa35c407f80c95b5e73e5e0f0 schema:familyName Park
88 schema:givenName Mignon
89 rdf:type schema:Person
90 Nfef4cb30ee5c4802a1944eb3757381fa schema:name dimensions_id
91 schema:value pub.1035956232
92 rdf:type schema:PropertyValue
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
97 schema:name Information Systems
98 rdf:type schema:DefinedTerm
99 sg:person.01140034726.32 schema:affiliation https://www.grid.ac/institutes/grid.86715.3d
100 schema:familyName Giroux
101 schema:givenName Sylvain
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01140034726.32
103 rdf:type schema:Person
104 sg:person.013775433513.58 schema:affiliation https://www.grid.ac/institutes/grid.86715.3d
105 schema:familyName Busnel
106 schema:givenName Pierre
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013775433513.58
108 rdf:type schema:Person
109 sg:pub.10.1007/b11930 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016953588
110 https://doi.org/10.1007/b11930
111 rdf:type schema:CreativeWork
112 https://doi.org/10.1109/fgcn.2008.227 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094880438
113 rdf:type schema:CreativeWork
114 https://doi.org/10.1145/564526.564544 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024208138
115 rdf:type schema:CreativeWork
116 https://doi.org/10.2495/bio030501 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098493401
117 rdf:type schema:CreativeWork
118 https://www.grid.ac/institutes/grid.86715.3d schema:alternateName Université de Sherbrooke
119 schema:name DOMUS lab, University of Sherbrooke, J1K 2R1, Sherbrooke, QC, Canada
120 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...