{"title":"Family Information Sharing System based on a judgment of emergency","authors":"Yuka Hasegawa, M. Oguchi","doi":"10.1109/GHTC.2013.6713675","DOIUrl":null,"url":null,"abstract":"It might be greatly helpful if you can share life logs between family members when a disaster occurs. However, it would be a serious problem if the users can see the personal information all the time without the permission of the person himself. In this paper, we propose the access control method that changes the access privilege depends on the real world situation. In the proposed method, external and internal information is used to judge whether the given situation is emergent or not. We developed a Family Information Sharing System (FISS) as an example using that access control method.","PeriodicalId":168082,"journal":{"name":"2013 IEEE Global Humanitarian Technology Conference (GHTC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Global Humanitarian Technology Conference (GHTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GHTC.2013.6713675","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
It might be greatly helpful if you can share life logs between family members when a disaster occurs. However, it would be a serious problem if the users can see the personal information all the time without the permission of the person himself. In this paper, we propose the access control method that changes the access privilege depends on the real world situation. In the proposed method, external and internal information is used to judge whether the given situation is emergent or not. We developed a Family Information Sharing System (FISS) as an example using that access control method.