STRoBAC - Spatial Temporal Role Based Access Control

被引:0
|
作者
Kim Tuyen Le Thi [1 ]
Tran Khanh Dang [1 ]
Kuonen, Pierre [2 ]
Drissi, Houda Chabbi [2 ]
机构
[1] HCMC Univ Technol, VNU HCMC, Ho Chi Minh City, Vietnam
[2] Coll Engn & Architecture, Fribourg, Switzerland
来源
COMPUTATIONAL COLLECTIVE INTELLIGENCE - TECHNOLOGIES AND APPLICATIONS, PT II | 2012年 / 7654卷
关键词
Access Control Model; GeoXACML; GIS Database; Or-BAC; Spatio-temporal Data; STRBAC; STRoBAC;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The development of geography-based services and systems has created the demands in which access control is the primary concern for geospatial data security. Although there are a variety of models to manage geospatial data access, none of them can fulfil the access control requirements. The objective of this paper is to propose a model that can support both spatio-temporal aspects and other contextual conditions as well as access control based on the role of subject. We call this model Spatial Temporal Role Based Access Control (STRoBAC). In addition, we propose an extension of GeoXACML framework, which is highly scalable and can help in declaring and enforcing various types of rules, to support the proposed model. This is the crucial contribution of our research compared to the existing approaches and models.
引用
收藏
页码:201 / 211
页数:11
相关论文
共 50 条
  • [31] Supporting relationships in access control using role based access control
    Barkley, J
    Beznosov, K
    Uppal, J
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
  • [32] Improved role based access control
    Engineering and Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Jisuanji Gongcheng, 2006, 7 (140-142+168):
  • [33] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [34] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    COMPUTER, 1996, 29 (02) : 38 - &
  • [35] An analysis of expressiveness and design issues for the generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Ghafoor, A
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (02) : 157 - 175
  • [36] A Location Temporal Based Access Control Model for IoTs
    Lee, Chao
    Guo, Yunchuan
    Yin, Lihua
    2013 AASRI CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 2013, 5 : 15 - 20
  • [37] A Temporal Semantic-Based Access Control Model
    Ravari, Ali Noorollahi
    Amini, Morteza
    Jalili, Rasool
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 559 - 568
  • [38] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [39] Role activation management in role based access control
    Lui, RWC
    Chow, SSM
    Hui, LCK
    Yiu, SM
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 358 - 369
  • [40] Embedded role based access control unit for the web document access control
    Shim, WB
    Park, S
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCI I, 2002, : 247 - 252