Universal service-providers for database private information retrieval (extended abstract)
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Introduction To Automata Theory, Languages, And Computation
Introduction To Automata Theory, Languages, And Computation
RANDOM '98 Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Wireless Location Privacy Protection
Computer
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Context-sensitive Access Control Model and Implementation
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Exploiting environmental properties for wireless localization
ACM SIGMOBILE Mobile Computing and Communications Review
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Hi-index | 0.01 |
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is possible to invert the role of sensor networks, and allow sensor nodes to actuate the environment. Such actuation can facilitate new forms of access control that are based on whether a user is located at the right place at the right time. In this paper, we explore the challenges of supporting spatio-temporal access control, where access to an object or service is based on the user's spatio-temporal context. Specifically, we focus on supporting spatio-temporal access control through the specification of access control policies, and show how complex spatio-temporal policies can be specified using automata. We outline a challenge-response mechanism for verifying user location in a centralized spatio-temporal access control mechanism. We utilize sensor networks in an inverted fashion to support spatio-temporal access control. Sensor nodes announce keys according to a time-varying schedule, and users may access restricted files/resources only if they are in the neighborhood of the correct sensor node and witness the appropriate cryptographic key.