Short paper: Towards a location-aware role-based access control model

被引:11
|
作者
Ray, I [1 ]
Yu, LJ [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/SECURECOMM.2005.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper we show how the Role-Based Access Control (RBAC) model can be extended to incorporate the notion of location. We show how the different components in the RBAC model are related with location and how this location information can be used to determine whether a subject has access to a given object. This model is suitable for applications consisting of static and dynamic objects, where location of the subject and object must be considered before granting access.
引用
收藏
页码:234 / 236
页数:3
相关论文
共 50 条
  • [41] Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients
    Abdou, AbdelRahman M.
    Matrawy, Ashraf
    van Oorschot, Paul C.
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 175 - 183
  • [42] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo, Nathalie
    Masoumzadeh, Amirreza
    Joshi, James
    [J]. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [43] Feasibility study of software reengineering towards role-based access control
    Li, Han
    Yang, Hongji
    Chen, Feng
    Guo, He
    Yang, Yuansheng
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2011, 42 (2-3) : 239 - 251
  • [44] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [45] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    [J]. 2000, (11):
  • [46] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [47] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [48] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    [J]. 2003, Huazhong University of Science and Technology (31):
  • [49] Location-aware access to hospital information and services
    Rodríguez, MD
    Favela, J
    Martínez, EA
    Muñoz, MA
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2004, 8 (04): : 448 - 455
  • [50] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44