Role-Based Access Control Models
Computer
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Modelling Contexts in the Or-BAC Model
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
An Access Control System for a Web Map Management Service
RIDE '04 Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE'04)
Jena: implementing the semantic web recommendations
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
An authorization model for geographical maps
Proceedings of the 12th annual ACM international workshop on Geographic information systems
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
A geotemporal role-based authorisation system
International Journal of Information and Computer Security
Modeling contextual security policies
International Journal of Information Security
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Dynamic security rules for geo data
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Rule-based policy enforcement point for map services
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Security mechanisms for geographic data
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Enforcing protection mechanisms for geographic data
W2GIS'12 Proceedings of the 11th international conference on Web and Wireless Geographical Information Systems
Hi-index | 0.00 |
We show in this paper that we can use the Or-BAC model [1] to express security policies for the visualization of spatial data. We first add to Or-BAC some visualization predicates and then show how to model various types of spatial data visualization contexts. We finally use these newly defined contexts to write security policies for the visualization of Geo Data.