{"title":"演示:使用控制隐私意识人脸识别的使用控制","authors":"Arpad Müller, Wisam Abbasi, A. Saracino","doi":"10.1109/ISCC55528.2022.9912953","DOIUrl":null,"url":null,"abstract":"In this paper, we demonstrate an application of privacy-preserving face recognition combined with an Attribute-Based Access Control framework to regulate access from subjects to critical resources while preserving the subject's privacy. The demonstrator exploits a mechanism that dynamically computes the best trade-off between ensured privacy and data utility, based on image acquisition conditions, and a decision engine based on XACML policies to express complex and dynamic conditions. The demonstrator can handle the dynamic association of new identities, as well as modification of access conditions. Attendees of the demo session can interact with the demo in a variety of ways, including modifying the camera input, but also through the customization of rules as well as the privacy parameter.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Demo: Usage Control using Controlled Privacy Aware Face Recognition\",\"authors\":\"Arpad Müller, Wisam Abbasi, A. Saracino\",\"doi\":\"10.1109/ISCC55528.2022.9912953\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we demonstrate an application of privacy-preserving face recognition combined with an Attribute-Based Access Control framework to regulate access from subjects to critical resources while preserving the subject's privacy. The demonstrator exploits a mechanism that dynamically computes the best trade-off between ensured privacy and data utility, based on image acquisition conditions, and a decision engine based on XACML policies to express complex and dynamic conditions. The demonstrator can handle the dynamic association of new identities, as well as modification of access conditions. Attendees of the demo session can interact with the demo in a variety of ways, including modifying the camera input, but also through the customization of rules as well as the privacy parameter.\",\"PeriodicalId\":309606,\"journal\":{\"name\":\"2022 IEEE Symposium on Computers and Communications (ISCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Symposium on Computers and Communications (ISCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC55528.2022.9912953\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Symposium on Computers and Communications (ISCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC55528.2022.9912953","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Demo: Usage Control using Controlled Privacy Aware Face Recognition
In this paper, we demonstrate an application of privacy-preserving face recognition combined with an Attribute-Based Access Control framework to regulate access from subjects to critical resources while preserving the subject's privacy. The demonstrator exploits a mechanism that dynamically computes the best trade-off between ensured privacy and data utility, based on image acquisition conditions, and a decision engine based on XACML policies to express complex and dynamic conditions. The demonstrator can handle the dynamic association of new identities, as well as modification of access conditions. Attendees of the demo session can interact with the demo in a variety of ways, including modifying the camera input, but also through the customization of rules as well as the privacy parameter.