Series
GVU Technical Report Series

Series Type
Publication Series
Description
Associated Organization(s)
Associated Organization(s)
Organizational Unit

Publication Search Results

Now showing 1 - 3 of 3
  • Item
    A Token-based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing
    (Georgia Institute of Technology, 2005) Iachello, Giovanni ; Abowd, Gregory D.
    We discuss the problems related to access control in automated capture and access systems, which capture, store and retrieve information gathered through sensors in physical environments. We discuss several unique requirements that set capture and access apart from traditional information processing systems, and that make existing access control approaches such as role-based access control (RBAC) and digital rights management (DRM) unsuitable for this domain. Drawing from access control theory research, we devise an access control system that satisfies these requirements. Further, we describe its implementation within an existing capture and access system, and discuss emergent issues relating to retention time, rights management and information sharing. We argue that some traditional security requirements might not in fact be appropriate when applied to environmental captured information, due to the perceptual and social characteristics of such data. Finally, we provide an example of how this access control architecture might fit in a capture and access system composed of mobile devices.
  • Item
    Between Dinner and Children's Bedtime: Predicting and Justifying Routines in the Home
    (Georgia Institute of Technology, 2005) Nagel, Kristine Susanne ; Hudson, James M. ; Abowd, Gregory D.
    Much previous research in availability, whether in the office or in the home, has developed linear regression models to help predict appropriate times for interruption. Although these models work well, they tend to be accurate only about 75% of the time. In this paper, we reconceptualize this problem as one of determining routines, rather than availability. We show that the same sensor measures, which predict availability accurately 75% of the time, can predict individual routines accurately 90% - 97% of the time. We argue that better identification of routines can help us to better identify individual availability, as we can develop more tailored models of individual availability in given household routines. In this paper, we also present findings from a day reconstruction method (DayRM) study, which provides more detailed descriptions of three routines in the home: mealtime, bedtime, and leisure.
  • Item
    An Evaluation Of The Comprehensibility and Usability Of a Design Method For Ubiquitous Computing Applications
    (Georgia Institute of Technology, 2005) Iachello, Giovanni ; Abowd, Gregory D.
    We have recently proposed a design process framework that assists the practitioner in tackling the privacy and security issues of ubiquitous computing (ubicomp) applications during their development. In this report, we discuss a design study to evaluate the comprehensibility and usability of the design method. The study was conducted with six graduate students at our institution. Students were given the option of using the design method for completing a semester-long design exercise of a ubiquitous computing application of their choice. Researchers analyzed their written deliverables using quantitative metrics and conducted follow-up interviews. Results suggest that the design method is comprehensible and usable by inexperienced designers. Participants commented that the method might help especially in the design of exploratory applications with diverging stakeholders, broadening the coverage of the design process and generating stronger rationales for design decisions.