LRBAC: A Location-aware Role-Based Access Control model

被引:0
|
作者
Ray, Indrakshi [1 ]
Kumar, Mahendra [1 ]
Yu, Lijun [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we show how the Role-Based Access Control (RBAC) model can be extended to incorporate the notion of location. We show how the different components in the RBAC model are related with location and how this location information can be used to determine whether a subject has access to a given object. This model is suitable for applications consisting of static and dynamic objects, where location of the subject and object must be considered before granting access.
引用
收藏
页码:147 / +
页数:2
相关论文
共 50 条
  • [31] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [32] LABAC: A Location-aware Attribute-based Access Control Scheme for Cloud Storage
    Xue, Yingjie
    Hong, Jianan
    Li, Wei
    Xue, Kaiping
    Hong, Peilin
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [33] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [34] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [35] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [36] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [37] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [38] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [39] Location-aware access to hospital information and services
    Rodríguez, MD
    Favela, J
    Martínez, EA
    Muñoz, MA
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2004, 8 (04): : 448 - 455
  • [40] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136