A spatio-temporal role-based access control model

被引:0
|
作者
Ray, Indrakshi [1 ]
Toahchoodee, Manachai [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we propose a spatio-temporal access control model, based on the Role-Based Access Control (RBAC) model, that is suitable for pervasive computing applications. We show the association of each component of RBAC with spatio-temporal information. We formalize the model by enumerating the constraints. This model can be used for applications where spatial and temporal information of a subject and an object must be taken into account before granting or denying access.
引用
收藏
页码:211 / +
页数:2
相关论文
共 50 条
  • [1] On the formalization and analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 399 - 452
  • [2] On the formal analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 17 - 32
  • [3] Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model
    Abdunabi, Ramadan
    Al-Lail, Mustafa
    Ray, Indrakshi
    France, Robert B.
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 501 - 515
  • [4] Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model
    Toahchoodee, Manachai
    Ray, Indrakshi
    McConnell, Ross M.
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (02): : 231 - 250
  • [5] A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    [J]. INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 76 - +
  • [6] A generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Latif, U
    Ghafoor, A
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) : 4 - 23
  • [7] Spatio-Temporal Role Based Access Control for Physical Access Control Systems
    Geepalla, Emsaieb
    Bordbar, Behzad
    Du, Xiaofeng
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2013, : 39 - 42
  • [8] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [9] Verification of Spatio-Temporal Role Based Access Control using Timed Automata
    Geepalla, Emsaieb
    Bordbar, Behzad
    Okano, Kozo
    [J]. 2012 IEEE 3RD INTERNATIONAL CONFERENCE ON NETWORKED EMBEDDED SYSTEMS FOR EVERY APPLICATION (NESEA), 2012,
  • [10] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754