A spatio-temporal access control model supporting delegation for pervasive computing applications

被引:0
|
作者
Ray, Indrakshi [1 ]
Toahchoodee, Manachai [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The traditional access control models, such as Role-Based Access Control (RBAC) and Bell-LaPadula (BLP), are not suitable for pervasive computing applications which typically lack well-defined security perimeters and where all the entities and interactions are not known in advance. We propose an access control model that handles such dynamic applications and uses environmental contexts to determine whether a user can get access to some resource. Our model is based on RBAC because it simplifies role management and is the de facto access control model for commercial organizations. However, unlike RBAC, it uses information from the environmental contexts to determine access decisions. The model also supports delegation which is important for dynamic applications where a user is unavailable and permissions may have to be transferred temporarily to another user/role in order to complete a specific task. This model can be used for any application where spatial and temporal information of a user and an object must be taken into account before granting access or temporarily transferring access to another user.
引用
收藏
页码:48 / 58
页数:11
相关论文
共 50 条
  • [1] Using Alloy to analyse a spatio-temporal access control model supporting delegation
    Toahchoodee, M.
    Ray, I.
    IET INFORMATION SECURITY, 2009, 3 (03) : 75 - 113
  • [2] Spatio-temporal Access Control: Challenges and Applications
    Damiani, Maria Luisa
    Martin, Herve
    Saygin, Yucel
    Spada, Maria Rita
    Ulmer, Cedric
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 175 - 175
  • [3] A context-based delegation access control model for pervasive computing
    Liscano, Ramiro
    Wang, Kaining
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 44 - +
  • [4] Enforcing spatio-temporal access control in mobile applications
    Ramadan Abdunabi
    Wuliang Sun
    Indrakshi Ray
    Computing, 2014, 96 : 313 - 353
  • [5] Enforcing spatio-temporal access control in mobile applications
    Abdunabi, Ramadan
    Sun, Wuliang
    Ray, Indrakshi
    COMPUTING, 2014, 96 (04) : 313 - 353
  • [6] A spatio-temporal role-based access control model
    Ray, Indrakshi
    Toahchoodee, Manachai
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 211 - +
  • [7] A Multitask Conflict Resolution Spatio-temporal Access Control Model
    Ying, Zhang
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 79 - 84
  • [8] Ensuring Spatio-Temporal Access Control for Real-World Applications
    Toahchoodee, Manachai
    Ray, Indrakshi
    Anastasakis, Kyriakos
    Georg, Geri
    Bordbar, Behzad
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 13 - 22
  • [9] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [10] Using oracle extensibility framework for supporting temporal and spatio-temporal applications
    Kothuri, Ravi
    Hanckel, Robert
    Yalamanchi, Aravind
    TIME 2008: 15TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2008, : 15 - 18