2009
DOI: 10.1007/978-3-642-03007-9_11
|View full text |Cite
|
Sign up to set email alerts
|

Spatiotemporal Access Control Enforcement under Uncertain Location Estimates

Abstract: Abstract. In a mobile environment, user's physical location plays an important role in determining access to resources. However, because current moving object databases do not keep the exact location of the moving objects, but rather maintain their approximate location for reasons of minimizing the updates, the access request evaluation cannot always guarantee the intended access control policy requirements. This may be risky to the system's security, especially for the highly sensitive resources. In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…Shin et al proposed a special probabilistic filter for evaluating location predicates in LBAC systems even for positioning systems that return an uncertainty area wherein the position is modeled as a Gaussian distribution [3]. The filter reduces the overall amount of exact location predicate evaluations by computing boundaries for a given location predicate on a rectangular logical location and a set of uncertain user and object locations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Shin et al proposed a special probabilistic filter for evaluating location predicates in LBAC systems even for positioning systems that return an uncertainty area wherein the position is modeled as a Gaussian distribution [3]. The filter reduces the overall amount of exact location predicate evaluations by computing boundaries for a given location predicate on a rectangular logical location and a set of uncertain user and object locations.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, H Shin. et al proposed to model user locations as circular uncertainty areas (UA) along with a probability density function (pdf) [3]. This leads to the problem that the evaluation of location predicates depends on a very computationally demanding numerical integration of the underlying pdf.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, since interval or range predicates are introduced into our location-based access control mechanism, it 2 The anonymity set is defined as the group of people who hold the same access privileges. allows a user to use a coarse-grained spatio-temporal information in location to achieve obfuscation.…”
Section: Lbs Information Transmissionmentioning
confidence: 99%
“…The increasing popularity of LBSs has led to a renewed research interest in location-based security, where one important problem is to enforce fine-grained spatio-temporal access control on a large number of users to prevent the unauthorized access of services and the disclosure of valuable LBS data [2,3]. Moreover, the possibility to identify the user who requests a given service and her/his location information at the time of the request has raised much concern on potential privacy violation [4].…”
Section: Introductionmentioning
confidence: 99%
“…The increasing popularity of LBSs has led to a renewed research interest in location-based security, where one important problem is to enforce fine-grained spatiotemporal access control on a large number of users to prevent the unauthorized access of services and the disclosure of valuable LBS data [2], [3], [4], [5]. Moreover, the possibility to identify the user who requests a given service and her/his 1 https://foursquare.com; https://www.loopt.com; http://maps.google.com location information at the time of the request has raised much concern on potential privacy violation [6], [7], [8], [9].…”
Section: Introductionmentioning
confidence: 99%