A spatio-temporal role-based access control model

被引:0
|
作者
Ray, Indrakshi [1 ]
Toahchoodee, Manachai [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we propose a spatio-temporal access control model, based on the Role-Based Access Control (RBAC) model, that is suitable for pervasive computing applications. We show the association of each component of RBAC with spatio-temporal information. We formalize the model by enumerating the constraints. This model can be used for applications where spatial and temporal information of a subject and an object must be taken into account before granting or denying access.
引用
收藏
页码:211 / +
页数:2
相关论文
共 50 条
  • [31] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [32] A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC
    Ying, Zhang
    Zhen, Xu
    Chi, Chen
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 14 - 20
  • [33] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [34] Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
    Chen L.
    Deng K.
    Jiang T.
    Yue G.
    Li P.
    Yang J.
    Xu X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (05): : 919 - 928
  • [35] Enforcing spatio-temporal access control in mobile applications
    Ramadan Abdunabi
    Wuliang Sun
    Indrakshi Ray
    Computing, 2014, 96 : 313 - 353
  • [36] Enforcing spatio-temporal access control in mobile applications
    Abdunabi, Ramadan
    Sun, Wuliang
    Ray, Indrakshi
    COMPUTING, 2014, 96 (04) : 313 - 353
  • [37] A spatio-temporal access control model supporting delegation for pervasive computing applications
    Ray, Indrakshi
    Toahchoodee, Manachai
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 48 - 58
  • [38] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [39] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [40] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):