Short paper: Towards a location-aware role-based access control model

被引:11
|
作者
Ray, I [1 ]
Yu, LJ [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/SECURECOMM.2005.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper we show how the Role-Based Access Control (RBAC) model can be extended to incorporate the notion of location. We show how the different components in the RBAC model are related with location and how this location information can be used to determine whether a subject has access to a given object. This model is suitable for applications consisting of static and dynamic objects, where location of the subject and object must be considered before granting access.
引用
收藏
页码:234 / 236
页数:3
相关论文
共 50 条
  • [1] LRBAC: A Location-aware Role-Based Access Control model
    Ray, Indrakshi
    Kumar, Mahendra
    Yu, Lijun
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 147 - +
  • [2] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [3] An access-control model for mobile computing with spatial constraints - Location-aware role-based access control with a method for consistency checks
    Decker, Michael
    [J]. ICE-B 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2008, : 185 - 190
  • [4] A Location-Aware Access Control Model for Mobile Workflow Systems
    Decker, Michael
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2009, 4 (01) : 50 - 66
  • [5] Towards Trustworthy Delegation in Role-Based Access Control Model
    Toahchoodee, Manachai
    Xie, Xing
    Ray, Indrakshi
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
  • [6] LAAC: A location-aware access control protocol
    Cho, YounSun
    Bao, Lichun
    Goodrich, Michael T.
    [J]. 2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 305 - +
  • [7] LAAC: A location-aware access control protocol
    Cho, YounSun
    Bao, Lichun
    Goodrich, Michael T.
    [J]. 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 316 - +
  • [8] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [9] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [10] A context-aware role-based access control model for Web services
    Shen, HB
    Hong, F
    [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 220 - 223