Role-Based Access Control Models
Computer
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
LRBAC: a location-aware role-based access control model
ICISS'06 Proceedings of the Second international conference on Information Systems Security
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Transactions on Computational Science IV
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Towards formal security analysis of GTRBAC using timed automata
Proceedings of the 14th ACM symposium on Access control models and technologies
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Combination of duty and historical constraints in role-based access control
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Architecture of context-aware workflow authorization management systems for workflow-based systems
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Integrating GSTRBAC spatial constraints in X-GTRBAC
Proceedings of the 7th International Conference on Frontiers of Information Technology
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration
Proceedings of the 3rd international conference on Security of information and networks
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
A map-layer-based access control model
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Transformation of spatio-temporal role based access control specification to alloy
MEDI'12 Proceedings of the 2nd international conference on Model and Data Engineering
A formal role-based access control model for security policies in multi-domain mobile networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 18th ACM symposium on Access control models and technologies
Specification and analysis of access control policies for mobile applications
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we propose a spatio-temporal access control model, based on the Role-Based Access Control (RBAC) model, that is suitable for pervasive computing applications. We show the association of each component of RBAC with spatio-temporal information. We formalize the model by enumerating the constraints. This model can be used for applications where spatial and temporal information of a subject and an object must be taken into account before granting or denying access.