Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems 2008
DOI: 10.1145/1463434.1463530
|View full text |Cite
|
Sign up to set email alerts
|

A location aware role and attribute based access control system

Abstract: In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges associated with resources are assigned depending on the attribute values of the resources, attribute values associated with users determine the association of users with privileges, and a location mapping function between physical and logical locations allows to enable/disable roles depending on the logical location of the users and thus p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2009
2009
2014
2014

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 5 publications
0
6
0
1
Order By: Relevance
“…Theorem 3: Assuming communication between RM, AS, and FMS is asynchronous, it is impossible for a deployment with feature monitors to guarantee correct evaluation of proximity constraints, even if the monitors have synchronous access to FMS. 7 Proof: Similar to the preceding Lemma, except the consensus protocol is now to be executed between the principals of our architecture. That is, as communication between RM, AS, and FMS is asynchronous, these three principals cannot achieve consensus.…”
Section: Properties Of Protocolsmentioning
confidence: 92%
See 1 more Smart Citation
“…Theorem 3: Assuming communication between RM, AS, and FMS is asynchronous, it is impossible for a deployment with feature monitors to guarantee correct evaluation of proximity constraints, even if the monitors have synchronous access to FMS. 7 Proof: Similar to the preceding Lemma, except the consensus protocol is now to be executed between the principals of our architecture. That is, as communication between RM, AS, and FMS is asynchronous, these three principals cannot achieve consensus.…”
Section: Properties Of Protocolsmentioning
confidence: 92%
“…Several extensions to RBAC have been proposed that attempt to incorporate various contextual factors while making access decisions. Previous works have incorporated location [8], [16], [13], [1], [19], [3], [2], [7], [4] and time [1], [3] of the user requesting access as a factor in decision making. Prox-RBAC [17] extended the notion of spatially aware RBAC to consider the relative locations of other users within an indoor space model [15], [14], and is the closest paper to the current work.…”
Section: Related Workmentioning
confidence: 99%
“…Generic location-based access control models [27,11,34,21,30] have been proposed as extensions to the Role-based Access Control (RBAC) [35]. Bertino et al proposed GEO-RBAC [11] to enable RBAC to incorporate spatial restrictions.…”
Section: Related Workmentioning
confidence: 99%
“…There has been a growing body of literature on spatially aware access control models [19,5,33,42,27,10,11,16,34,2,6,21,1,30]. Building on these insights, this study of GSCSs aspires to further our understanding of spatiallyaware access control in two areas.…”
Section: Introductionmentioning
confidence: 99%
“…SRBAC supports spatial constraints on enabling and disabling of roles, and can be used to constrain the set of permissions available to the roles that a user may activate at a given location. The authors in [5] proposed a location mapping function between physical and logical locations allows roles depending on the user's logical location. They based on the Google Maps API to get the location of users.…”
Section: B Role Based Authorizationmentioning
confidence: 99%