Advertisement

LoT-RBAC: A Location and Time-Based RBAC Model

  • Suroop Mohan Chandran
  • J. B. D. Joshi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3806)

Abstract

Recent growth in location-based mobile services has introduced a significant need for location and time-based access control to resources. High mobility of the users and services in the emerging mobile applications in particular make the issue of controlling who can access what information and resources from which locations a daunting challenge. Several RBAC based models have been proposed that attempt to capture the location based and/or time-based access control requirements in various applications. However, they have limited flexibility and granularity. In this paper, we propose a Location and Time-based RBAC (LoT-RBAC) model to address the access control requirements of highly mobile, dynamic environments to provide both location and time based control.

Keywords

location based access role based access temporal constraint 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hansen, F., Oleshchuk, V.: Spatial Role-Based Access Control Model for Wireless Networks. In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, October 6-9, vol. 3, pp. 2093–2097 (2003)Google Scholar
  2. 2.
    Bertino, E., Catania, B., Damiani, M.L., Persasca, P.: GEO-RBAC: A Spatially Aware RBAC. In: 10th Symposium on Access Control Models and Technologies, SACMAT 2005 (2005)Google Scholar
  3. 3.
    Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4–23 (2005)CrossRefGoogle Scholar
  4. 4.
    Joshi, J.B.D., Bertino, E., Ghafoor, A.: Analysis of Expressiveness and Design Issues for a Temporal Role Based Access Control Model. IEEE Transactions on Dependable and Secure Computing (accepted)Google Scholar
  5. 5.
    Joshi, J.B.D., Bertino, E., Ghafoor, A.: Formal Foundations for Hybrid Hierarchies in GTRBAC. ACM Transactions on Information and System Security (under review)Google Scholar
  6. 6.
    Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchy and inheritance semantics for GTRBAC. In: 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, June 3-4 (2002)Google Scholar
  7. 7.
    Joshi, J.B.D., Bertino, E., Shafiq, B., Ghafoor, A.: Dependancies and Separation of Duty Constraints in GTRBAC. In: 8th ACM Symposium on Access Control Models and Technologies, Como, Italy, June 2-3 (2003)Google Scholar
  8. 8.
    Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)Google Scholar
  9. 9.
    Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Transactions on Information & System Security 4(3), 191–233 (2001)CrossRefGoogle Scholar
  10. 10.
    Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on Access control models and technologies, pp. 10–20. ACM Press, Chantilly (2001)CrossRefGoogle Scholar
  11. 11.
    Strembeck, M., Neumann, G.: An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security (TISSEC) 7(3), 392–427 (2004)CrossRefGoogle Scholar
  12. 12.
    Ferraiolo, D.F., Sandhu, F., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access Control. ACM Transactions on Information and System Security (TISSEC) 4(3) (August 2001)Google Scholar
  13. 13.
    Erwig, M., Schneider, M.: Spatio-Temporal Predicates. IEEE Transactions on Knowledge and Data Engineering 14(4), 881–901 (2002)CrossRefGoogle Scholar
  14. 14.
    Corradi, A., Montanari, R., Tibaldi, D.: Context-based Access Control in Ubiquitous Environments. In: Proceedings. Third IEEE International Symposium on Network Computing and Applications (NCA 2004), August 30 -September 1, pp. 253–260 (2004)Google Scholar
  15. 15.
    Fu, S., Xu, C.-Z.: A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments. In: Proceedings. 19th IEEE International Parallel and Distributed Processing Symposium, April 04-08, p. 289b (2005)Google Scholar
  16. 16.
    Wedde, H.F., Lischka, M.: Role Based Access Control in Remote and Ambient Spaces. In: Proceedings of the ninth ACM symposium on Access control models and technologies, pp. 21–30. ACM Press, YorkTown Heights (2004)CrossRefGoogle Scholar
  17. 17.
    Jiang, H., Elmagarmid, A.K.: Spatial and temporal content-based access to hypervideo databases. The VLDB Journal 7, 226–238 (1998)CrossRefGoogle Scholar
  18. 18.
    Wang, W.: Team-and-Role-Based Organizational Context and Access Control for Cooperative Hypermedia Environments. In: Proceedings of Hypertext 1999: Returning to our diverse roots, Darmstadt, Germany, pp. 37–46. ACM Press, New York (1999)CrossRefGoogle Scholar
  19. 19.
    Atluri, V., Chun, S.A.: An Authorization Model for Geospatial Data. IEEE Transactions on Dependable and Secure Computing 1(4) (October-December 2004)Google Scholar
  20. 20.
    Narayanan, A.K.: Realms and States: A Framework for Location Aware Mobile Computing. In: Proceedings of the 1st International Workshop on Mobile Commerce, Rome, Italy, pp. 48–54 (2001)Google Scholar
  21. 21.
    Kumar, A., Karnik, N., Chafle, G.: Context-Sensitivity in Role-based Access Control. ACM SIGOPS Operating Systems Review 36(3), 53–66 (2002)CrossRefGoogle Scholar
  22. 22.
    Thomas, R.K.: Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In: Proceedings of the second ACM workshop on Role-based access control, Fairfax, Virginia, United States, pp. 13–19 (1997)Google Scholar
  23. 23.
    Zhang, G., Parashar, M.: Dynamic Context-aware Access Control for Grid Applications. In: Proceedings of Fourth International Workshop on Grid Computing, November 17, pp. 101–108 (2003)Google Scholar
  24. 24.
    Joshi, J.B.D.: Access-control language for multidomain environments. IEEE Internet Computing 8(6), 40–50 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Suroop Mohan Chandran
    • 1
  • J. B. D. Joshi
    • 1
  1. 1.Department of Information Sciences and TelecommunicationsUniversity of Pittsburgh 

Personalised recommendations