Arjmand Samuel

Arjmand Samuel
Microsoft · Connections

About

24
Publications
6,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
604
Citations

Publications

Publications (24)
Chapter
Lab of Things (LoT) is a flexible platform that lowers the barrier for experimental research that uses connected devices in homes and other physical spaces. LoT enables (1) easy interconnection of devices and implementation of experimental technology, (2) easy deployment and monitoring of field studies and analysis of data from experiments, and (3)...
Article
With the rich functionalities and enhanced computing capabilities available on mobile computing devices with touch screens, users not only store sensitive information (such as credit card numbers) but also use privacy sensitive applications (such as online banking) on these devices, which make them hot targets for hackers and thieves. To protect pr...
Article
Full-text available
Background: The use of smart home sensor systems is growing primarily due to the appeal of unobtrusively monitoring older adult health and wellness. However, integrating large-scale sensor systems within residential settings can be challenging when deployment takes place across multiple environments, requiring customization of applications, connec...
Article
Full-text available
Security and privacy of complex systems is a concern due to proliferation of cyber based technologies. Several researchers have pointed out that for the proper enforcement of privacy rules in a complex system, the privacy requirements should be captured in access control systems. In this paper, we present a framework for composition and enforcement...
Article
Integrating sensor systems within the home can be a tedious process due to the challenges of deploying systems across multiple environments, customizing applications, and connecting across various devices. We demonstrate the deployment of sensors using the Lab of Things platform within a residence over a 3 month period. We developed a real time vis...
Chapter
Lab of Things (LoT) is a flexible platform that lowers the barrier for experimental research that uses connected devices in homes and other physical spaces. LoT enables (1) easy interconnection of devices and implementation of experimental technology, (2) easy deployment and monitoring of field studies and analysis of data from experiments, and (3)...
Article
Full-text available
Lab of Things (LoT, lab-of-things.com) is a research platform for interconnection, programming, and large scale deployment of devices and sensors. These devices and sensors can then be used for deployment of field studies in a variety of research areas including elderly care, energy management, and the like. LoT is built on top of HomeOS, a middle-...
Conference Paper
With the rich functionalities and enhanced computing capabilities available on mobile computing devices with touch screens, users not only store sensitive information (such as credit card numbers) but also use privacy sensitive applications (such as online banking) on these devices, which make them hot targets for hackers and thieves. To protect pr...
Conference Paper
Researchers who develop new home technologies using connected devices often want to conduct large-scale field studies in homes to evaluate their technology, but conducting such studies today is extremely challenging. Inspired by the success of PlanetLab, which enabled development and evaluation of global network services, we are developing a shared...
Conference Paper
We present the design, implementation, and evaluation of B4, a private WAN connecting Google's data centers across the planet. B4 has a number of unique characteristics: i) massive bandwidth requirements deployed to a modest number of sites, ii) elastic ...
Article
Full-text available
From paper to computers, the way that we have been writing down thoughts and performing symbolic computations has been constantly evolving. Teaching methods closely follow this trend, leveraging existing technology to make teaching more effective and preparing students for their later careers with the available technology. Right now, in 2012, we ar...
Conference Paper
Full-text available
Citizens have always played an important role in emergency management such as urban flooding response. New information and communication technologies such as smart phones and computer-based social networks have great potential to transform the roles of citizens in emergency management. However, current digital citizen science projects are usually l...
Article
One of the most popular access control management,approaches,is to abstract security administration tasks by employing,system,and securi ty policies [1]. While policy based security management approach offers a flexible, tra nsparent and extensible administration environment, it also highlights the need for consis tent composition, verification and...
Article
A community cyberinfrastructure needs to be developed, to enable multidisciplinary research and collaboration in the fields of science and engineering. The introduction of a cyberinfrastructure will enable researchers, to share knowledge and the results of their studies, along with computing cycles, storage and bandwidth. It is also suggested that...
Article
Full-text available
Today, public-service delivery mechanisms such as hospitals, police, and fire departments rely on digital generation, storage, and analysis of vital information. To protect critical digital resources, these organizations employ access-control mechanisms, which define rules under which authorized users can access the resources they need to perform o...
Article
Policy-based management for federated healthcare systems has recently gained increasing attention due to strict privacy and disclosure rules. Although the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our understanding of designing privacy-preserving policies for healthcare databases, the need to...
Conference Paper
Network services, resources, protocols, and communication technologies give rise to multiple dimensions of heterogeneity in an enterprise, resulting in a complex administration and management operation. The administrative challenge is further exacerbated by the fact that multiple enterprises share resources and users, giving rise to semantic confli...
Conference Paper
Distributed workflow based systems are widely used in various application domains including e-commerce, digital government, healthcare, manufacturing and many others. Workflows in these application domains are not restricted to the administrative boundaries of a single organization [1]. The tasks in a workflow need to be performed in a certain orde...
Conference Paper
Full-text available
In this paper, we propose an architecture for adaptive real-time workflow-based collaborative system. Such a system is needed to support real-time communication and sharing of information among predefined or ad hoc team of users collaborating with each other for the execution of their respective tasks in the workflow. A key requirement for real-tim...
Article
In a computing environment where access to system re- sources is controlled by an access control policy and execu- tion of database transactions is dictated by database lock- ing policy, interaction between the two policies can result in constraints restricting execution of transactions. We present a methodology for the veriìcation of database tran...
Article
Full-text available
Access control policies in healthcare domain define permissions for users to access different medical records. Role Based Access Control (RBAC) helps to restrict medical records to users in a certain role but sensitive information in medical records can still be compromised by authorized insiders. The threat is from users who are not treating the p...

Network

Cited By