LRBAC: A Location-aware Role-Based Access Control model

被引:0
|
作者
Ray, Indrakshi [1 ]
Kumar, Mahendra [1 ]
Yu, Lijun [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we show how the Role-Based Access Control (RBAC) model can be extended to incorporate the notion of location. We show how the different components in the RBAC model are related with location and how this location information can be used to determine whether a subject has access to a given object. This model is suitable for applications consisting of static and dynamic objects, where location of the subject and object must be considered before granting access.
引用
收藏
页码:147 / +
页数:2
相关论文
共 50 条
  • [1] Short paper: Towards a location-aware role-based access control model
    Ray, I
    Yu, LJ
    [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 234 - 236
  • [2] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [3] An access-control model for mobile computing with spatial constraints - Location-aware role-based access control with a method for consistency checks
    Decker, Michael
    [J]. ICE-B 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2008, : 185 - 190
  • [4] A Location-Aware Access Control Model for Mobile Workflow Systems
    Decker, Michael
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2009, 4 (01) : 50 - 66
  • [5] LAAC: A location-aware access control protocol
    Cho, YounSun
    Bao, Lichun
    Goodrich, Michael T.
    [J]. 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 316 - +
  • [6] LAAC: A location-aware access control protocol
    Cho, YounSun
    Bao, Lichun
    Goodrich, Michael T.
    [J]. 2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 305 - +
  • [7] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [8] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [9] A context-aware role-based access control model for Web services
    Shen, HB
    Hong, F
    [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 220 - 223
  • [10] Context-aware role-based access control model for Web services
    Feng, X
    Jun, M
    Hao, H
    Li, X
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 430 - 436