An authorization model for geographical maps
Proceedings of the 12th annual ACM international workshop on Geographic information systems
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Proceedings of the 6th international conference on Mobile data management
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
A geotemporal role-based authorisation system
International Journal of Information and Computer Security
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Web mapping for location based decision making
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Security policies for the visualization of Geo Data
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Dynamic security rules for geo data
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
A map-layer-based access control model
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Hi-index | 0.00 |
In this paper, we present an access control model forspatial data on Web. Such a model is based on thefollowing assumptions: first, spatial data consist ofobjects with sharp boundaries located in a geographicalspace; second, data are manipulated through theoperations provided by a Web Map ManagementService. The goal of the system is to control the way dataare accessed by users having different profiles. Wepropose an extension of classical models based onauthorization rules by assigning authorizations ageographical scope. In such a way, the operations usersmay execute on spatial data may vary, depending onuser identity and object position.