2019
Authors
Shehu, AS; Pinto, A; Correia, ME;
Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
The growth in Internet usage has increased the use of electronic services requiring users to register their identity on each service they subscribe to. This has resulted in the prevalence of redundant users data on different services. To protect and regulate access by users to these services identity management systems (IdMs) are put in place. IdMs uses frameworks and standards e.g SAML, OAuth and Shibboleth to manage digital identities of users for identification and authentication process for a service provider. However, current IdMs have not been able to address privacy issues (unauthorised and fine-grained access) that relate to protecting users identity and private data on web services. Many implementations of these frameworks are only concerned with the identification and authentication process of users but not authorisation. They mostly give full control of users digital identities and data to identity and service providers with less or no users participation. This results in a less privacy enhanced solutions that manage users available data in the electronic space. This article proposes a user-centred mandate representation system that empowers resource owners to take full of their digital data; determine and delegate access rights using their mobile phone. Thereby giving users autonomous powers on their resources to grant access to authenticated entities at their will. Our solution is based on the OpenID Connect framework for authorisation service. To evaluate the proposal, we've compared it with some related works and the privacy requirements yardstick outlined in GDPR regulation [1] and [2]. Compared to other systems that use OAuth 2.0 or SAML our solution uses an additional layer of security, where data owner assumes full control over the disclosure of their identity data through an assertion issued from their mobile phones to authorisation server (AS), which in turn issues an access token. This would enable data owners to assert the authenticity of a request, while service providers and requestors also benefit from the correctness and freshness of identity data disclosed to them.
2019
Authors
Novais, P; Jung, JJ; González, GV; Caballero, AF; Navarro, E; González, P; Carneiro, D; Pinto, A; Campbell, AT; Durães, D;
Publication
ISAmI
Abstract
2019
Authors
de Sousa, HR; Pinto, A;
Publication
BLOCKCHAIN
Abstract
Digital economy relies on global data exchange flows. On May 25th 2018 the GDPR came into force, representing a shift in data protection legislation by tightening data protection rules. This paper introduces an innovative solution that aims to diminish the burden resulting from new regulatory demands on all stakeholders. The presented solution allows the data controller to collect the consent, of a European citizen, in accordance to the GDPR and persist proof of said consent on public a blockchain. On the other hand, the data subject will be able to express his consent conveniently through his smartphone and evaluate the data controller’s performance. The regulator’s role was also contemplated, meaning that he can leverage certain system capabilities specifically designed to gauge the status of the relationships between data subjects and data controllers.
2019
Authors
Figueira, A; Guirnaraes, N; Torgo, L;
Publication
JOURNAL OF WEB ENGINEERING
Abstract
The proliferation of false information on social networks is one of the hardest challenges in today's society, with implications capable of changing users perception on what is a fact or rumor. Due to its complexity, there has been an overwhelming number of contributions from the research community like the analysis of specific events where rumors are spread, analysis of the propagation of false content on the network, or machine learning algorithms to distinguish what is a fact and what is "fake news". In this paper, we identify and summarize some of the most prevalent works on the different categories studied. Finally, we also discuss the methods applied to deceive users and what are the next main challenges of this area.
2019
Authors
Cabral, B; Figueira, A;
Publication
KDIR: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT - VOL 1: KDIR
Abstract
Nowadays, students commonly use and are assessed through an online platform. New pedagogy theories that promote the active participation of students in the learning process, and the systematic use of problem-based learning, are being adopted using an eLearning system for that purpose. However, although there can be intense feedback from these activities to students, usually it is restricted to the assessments of the online set of tasks. We propose a model that informs students of abnormal deviations of a “correct” learning path. Our approach is based on the vision that, by obtaining this information earlier in the semester, may provide students and educators an opportunity to resolve an eventual problem regarding the student’s current online actions towards the course. In the major learning management systems available, the interaction between the students and the system, is stored in log. Our proposal uses that logged information, and new one computed by our methodology, such as the time each student spends on an activity, the number and order of resources used, to build a table that a machine learning algorithm can learn from. Results show that our model can predict with more than 86% accuracy the failing situations. Copyright
2019
Authors
Cabral, B; Figueira, A;
Publication
ADVANCES IN WEB-BASED LEARNING - ICWL 2019
Abstract
In this article we propose an automatic system that informs students of abnormal deviations of a virtual learning path that leads to the best grades in the course. Our motivation is based on the fact that by obtaining this information earlier in the semester, may provide students and educators an opportunity to resolve an eventual problem regarding the student's current online actions towards the course. Our goal is therefore to prevent situations that have a significant probability to lead to a pour grade and, eventually, to failing. Our methodology can be applied to online courses that integrate the use of an online platform that stores user actions in a log file, and that has access to other student's evaluations. The system is based on a data mining process on the log files and on a self-feedback machine learning algorithm that works paired with the Moodle LMS. Our results shown that it is possible to predict grade levels by only taking interaction patterns in consideration.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.