Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por HumanISE

2018

Virtual Reality Games: a study about the level of interaction vs. narrative and the gender in presence and cybersickness.

Autores
Goncalves, G; Melo, M; Bessa, M;

Publicação
2018 1ST INTERNATIONAL CONFERENCE ON GRAPHICS AND INTERACTION (ICGI 2018)

Abstract
Virtual reality (VR) games have the potential to produce immersive experiences. To better explore the potential of VR games, it becomes necessary to understand what affects the player's presence in VR games. This work measures and compares the levels of presence and cybersickness in VR environments. Two games with different levels of interaction and narrative were compared. Presence and cybersickness were measured in a sample of 32 subjects using the IPQp questionnaire and a Portuguese version of the SSQ respectively. The results indicate that there were no differences in presence and cybersickness between the interaction and the narrative dimensions. To extend the study, the gender of participants was also considered an independent variable where we found significant differences in the metrics of presence and experienced realism, nausea and disorientation with female participants getting higher scores.

2018

A Brief Overview of Existing Tools for Testing the Internet-of-Things

Autores
Dias, JP; Couto, F; Paiva, ACR; Ferreira, HS;

Publicação
2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW)

Abstract
Systems are error-prone. Big systems have lots of errors. The Internet-of-Things poses us one of the biggest and widespread systems, where errors directly impact people's lives. Testing and validating is how one deals with errors; but testing and validating a planetary-scale, heterogeneous, and ever-growing ecosystem has its own challenges and idiosyncrasies. As of today, the solutions available for testing these systems are insufficient and fragmentary. In this paper we provide an overview on test approaches, tools and methodologies for the Internet-of-Things, its software and its devices. Our conclusion is that we are still lagging behind on the best practices and lessons learned from the Software Engineering community in the past decades.

2018

Dynamic Allocation of Serverless Functions in IoT Environments

Autores
Pinto, D; Dias, JP; Ferreira, HS;

Publicação
2018 IEEE 16TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2018)

Abstract
The IoT area has grown significantly in the last few years and is expected to reach a gigantic amount of 50 billion devices by 2020. The appearance of serverless architectures, specifically highlighting FaaS, raises the question of the suitability of using them in IoT environments. Combining IoT with a serverless architectural design can be effective when trying to make use of the local processing power that exists in a local network of IoT devices and creating a fog layer that leverages computational capabilities that are closer to the end-user. In this approach, which is placed between the device and the serverless function, when a device requests for the execution of a serverless function will decide based on previous metrics of execution if the serverless function should be executed locally, in the fog layer of a local network of IoT devices, or if it should be executed remotely, in one of the available cloud servers. Therefore, this approach allows dynamically allocating functions to the most suitable layer.

2018

A Blockchain-Based Scheme for Access Control in e-Health Scenarios

Autores
Dias, JP; Ferreira, HS; Martins, A;

Publicação
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, SoCPaR 2018, Porto, Portugal, December 13-15, 2018

Abstract
Access control is a crucial part of a system’s security, restricting what actions users can perform on resources. Therefore, access control is a core component when dealing with e-Health data and resources, discriminating which is available for a certain party. We consider that current systems that attempt to assure the share of policies between facilities are mostly centralized, being prone to system’s and network’s faults and do not assure the integrity of policies lifecycle. Using a blockchain as store system for access policies we are able to ensure that the different entities have knowledge about the policies in place while maintaining a record of all permission requests, thus assuring integrity, auditability and authenticity. © 2020, Springer Nature Switzerland AG.

2018

A Blockchain-based Approach for Access Control in eHealth Scenarios

Autores
Dias, JP; Reis, L; Ferreira, HS; Martins, A;

Publicação
JOURNAL OF INFORMATION ASSURANCE AND SECURITY

Abstract
Access control is a crucial part of a system's security, restricting what actions users can perform on resources. Therefore, access control is a core component when dealing with eHealth data and resources, discriminating which is available for a certain party. We consider that current systems that attempt to assure the share of policies between facilities are prone to system's and network's faults and do not assure the integrity of policies life-cycle. By approaching this problem with a blockchain where the operations are stored as transactions, we can ensure that the different facilities have knowledge about all the parts that can act over the eHealth resources while maintaining integrity, auditability, and authenticity.

2018

Blockchain-Based PKI for Crowdsourced IoT Sensor Information

Autores
Pinto, GV; Dias, JP; Ferreira, HS;

Publicação
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, SoCPaR 2018, Porto, Portugal, December 13-15, 2018

Abstract
The Internet of Things is progressively getting broader, evolving its scope while creating new markets and adding more to the existing ones. However, both generation and analysis of large amounts of data, which are integral to this concept, may require the proper protection and privacy-awareness of some sensitive information. In order to control the access to this data, allowing devices to verify the reliability of their own interactions with other endpoints of the network is a crucial step to ensure this required safeness. Through the implementation of a blockchain-based Public Key Infrastructure connected to the Keybase platform, it is possible to achieve a simple protocol that binds devices’ public keys to their owner accounts, which are respectively supported by identity proofs. The records of this blockchain represent digital signatures performed by this Keybase users on their respective devices’ public keys, claiming their ownership. Resorting to this distributed and decentralized PKI, any device is able to autonomously verify the entity in control of a certain node of the network and prevent future interactions with unverified parties. © 2020, Springer Nature Switzerland AG.

  • 265
  • 641