An access-control model for mobile computing with spatial constraints - Location-aware role-based access control with a method for consistency checks

被引:0
|
作者
Decker, Michael [1 ]
机构
[1] Univ Karlsruhe TH, Inst AIFB, D-76128 Karlsruhe, Germany
关键词
mobile information systems; access control; location-based services; mobile security;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Some of the most salient challenges that come along with the employment of mobile information systems stem from security issues: portable devices like PDAs, smartphones and notebooks easily get stolen or lost and wireless data transmission could be eavesdropped, so that unauthorized individuals gain access to confidential resources. One approach to tackle these problems is location-aware access control, i.e. based on knowledge about the user's position the information system can decide if access to a resource should be granted or not. For example a nurse using a PDA should only be allowed to access confidential patient data while staying on the premises of the hospital. In our article we present a data model for location-aware access control based on the concepts of roles. Using our model it is possible to assign location restrictions to several entities, e.g. to users, to roles or permissions. We also propose a method to analyze the consistency of spatial constraints expressed by an instance of our model.
引用
收藏
页码:185 / 190
页数:6
相关论文
共 50 条
  • [1] LRBAC: A Location-aware Role-Based Access Control model
    Ray, Indrakshi
    Kumar, Mahendra
    Yu, Lijun
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 147 - +
  • [2] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [3] Short paper: Towards a location-aware role-based access control model
    Ray, I
    Yu, LJ
    [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 234 - 236
  • [4] A Location-Aware Access Control Model for Mobile Workflow Systems
    Decker, Michael
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2009, 4 (01) : 50 - 66
  • [5] A soft computing based location-aware access control for smart buildings
    Hernandez, Jose L.
    Moreno, M. Victoria
    Jara, Antonio J.
    Skarmeta, Antonio F.
    [J]. SOFT COMPUTING, 2014, 18 (09) : 1659 - 1674
  • [6] A soft computing based location-aware access control for smart buildings
    José L. Hernández
    M. Victoria Moreno
    Antonio J. Jara
    Antonio F. Skarmeta
    [J]. Soft Computing, 2014, 18 : 1659 - 1674
  • [7] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [8] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [9] Consistency maintenance for constraint in role-based access control model
    Wei-li Han
    Gang Chen
    Jian-wei Yin
    Jin-xiang Dong
    [J]. Journal of Zhejiang University-SCIENCE A, 2002, 3 (3): : 292 - 297
  • [10] Consistency maintenance for constraint in role-based access control model
    韩伟力
    陈刚
    董金祥
    尹建伟
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2002, (03) : 43 - 48