Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
ACM Transactions on Information and System Security (TISSEC)
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
X-gtrbac admin: A decentralized administration model for enterprise-wide access control
ACM Transactions on Information and System Security (TISSEC)
Context and Location-Aware Encryption for Pervasive Computing Environments
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Efficient techniques for realizing geo-spatial access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Adaptive location constraint processing
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Location constraints in digital rights management
Computer Communications
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Secure localization with phantom node detection
Ad Hoc Networks
Policy Mapper: Administering Location-Based Access-Control Policies
IEEE Internet Computing
Spatial Domains for the Administration of Location-based Access Control Policies
Journal of Network and Systems Management
Approach to Supporting Continuity of Usage in Location-Based Access Control
FTDCS '08 Proceedings of the 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems
STARBAC: spatiotemporal role based access control
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A policy language for distributed usage control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Implicit authentication for mobile devices
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Dynamic security rules for geo data
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
A map-layer-based access control model
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Towards application-centric implicit authentication on smartphones
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Hi-index | 0.00 |
The objective of spatially-aware access control models is to regulate the access to protected objects based on position information. In that last years, increasing attention has been paid to spatially-aware access control models for mobile and pervasive applications. Following the experience of design of the GEO-RBAC model, in this paper we want to look at those models with a critical eye and point out open conceptual and architectural challenges. In this paper, we first discuss architectural issues related to the development of a multi-domain access control system based on GEO-RBAC. Then we present the guidelines of a novel and space-centric modeling framework which aims at overcoming the conceptual limitations of the present model and similar solutions.