2006
DOI: 10.1016/j.cose.2005.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Towards a location-based mandatory access control model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
39
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 62 publications
(39 citation statements)
references
References 5 publications
0
39
0
Order By: Relevance
“…The most important feature that values this system above DAC is the fact that MAC distinguishes between the subject and object domains and allows the usage of permissions and limitations accordingly. Thus, it is much better in terms of logical comparisons when compared with DAC [72][73][74].…”
Section: Mandatory Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…The most important feature that values this system above DAC is the fact that MAC distinguishes between the subject and object domains and allows the usage of permissions and limitations accordingly. Thus, it is much better in terms of logical comparisons when compared with DAC [72][73][74].…”
Section: Mandatory Access Controlmentioning
confidence: 99%
“…Although the access and usage possibilities are not that good, MAC is easy to understand and use; thus, it has an intermediate level of Ease of Privilege Assignments [72][73][74]. As MAC can do certain distinctions, it has an intermediate level of Syntactic And Semantic Support For Specifying AC Rules.As the assignments are carried out by a central system, no user can transfer their rights to another user, which contributes to a low level of Delegation of Administrative Capabilities.…”
Section: Mandatory Access Controlmentioning
confidence: 99%
“…Ray and Kumar describe a formal, Turing-incomplete model that extends a MAC system with location primitives [16]. They describe how the location of a subject and an object can be used to make decisions about granting subjects access to objects, while keeping the locations of subjects and objects private from each other.…”
Section: Related Workmentioning
confidence: 99%
“…Previously developed declarative (and Turing-incomplete) policy-specification languages [13,14,15,16] are limited to location-based access-control policies.…”
Section: Introductionmentioning
confidence: 99%
“…INTRODUCTION Radio localization systems have been integrated into many wireless network solutions. For example, location-based access control (LBAC) determines the users' privileges of accessing critical information by taking the users' physical locations into account [1], [2]. Identity spoofing detection mechanisms use location information to differentiate malicious nodes from legitimate nodes [3].…”
mentioning
confidence: 99%