2009
DOI: 10.1007/978-3-642-01004-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Role Based Access Control with Spatiotemporal Context for Mobile Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(30 citation statements)
references
References 16 publications
0
30
0
Order By: Relevance
“…There are only a few papers targeting at the context-aware RABC (Aich, 2009;Kulkarni, 2008), but they did not describe how to discover or identify contextaware roles. As a result, many works started to study context aware role mining and role based recommendation systems.…”
Section: Related Workmentioning
confidence: 99%
“…There are only a few papers targeting at the context-aware RABC (Aich, 2009;Kulkarni, 2008), but they did not describe how to discover or identify contextaware roles. As a result, many works started to study context aware role mining and role based recommendation systems.…”
Section: Related Workmentioning
confidence: 99%
“…There are also spatiotemporal extensions of RBAC that include both temporal and spatial constraints [16,2,6,1]. In STARBAC [2,1], the spatial constraints consider only the containment of a physical location in a set of points (as a logical location) for role enabling and disabling.…”
Section: Related Workmentioning
confidence: 99%
“…In STARBAC [2,1], the spatial constraints consider only the containment of a physical location in a set of points (as a logical location) for role enabling and disabling. LoT-RBAC [16] is another spatiotemporal extension that employs separate spatial containment hierarchy for each physical and logical location in order to incorporate fine-grained spatial constraints into RBAC.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several models have been proposed [1,2,5] that extend RBAC to allow the specification of policies in which the access decision is determined by the spatio-temporal context of subjects and objects. However, these models relate the role extents to fixed locations, restricting the policies to static zones.…”
Section: Introductionmentioning
confidence: 99%