Access Control in Geographic Databases

  • Liliana Kasumi Sasaoka
  • Claudia Bauzer Medeiros
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4231)


The problem of access control in databases consists of determining when (and if) users or applications can access stored data, and what kind of access they are allowed. This paper discusses this problem for geographic databases, where constraints imposed on access control management must consider the spatial location context. The model and solution provided are motivated by problems found in AM/FM applications developed in the management of telephone infrastructure in Brazil, in a real life situation.


Access Control Spatial Object Access Control Model Access Request Subway Station 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AJS+96]
    Ashby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D.: Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria. Technical Report 001-005, National Computer Security Center, 75 pages (1996)Google Scholar
  2. [BBC+04]
    Belussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A.: An Authorization Model for Geographical Maps. In: Proc. 14th ACM GIS, November 2004, pp. 82–91 (2004)Google Scholar
  3. [BBF01]
    Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security 4(3), 191–223 (2001)CrossRefGoogle Scholar
  4. [BCDP05]
    Bertino, E., Catania, B., Damiani, M., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: Proc., 10th ACM Symposium on Access Control, June 2005, pp. 29–37 (2005)Google Scholar
  5. [BCFM00]
    Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and enforcing access control policies for XML document sources. World Wide Web 3(3), 139–151 (2000)MATHCrossRefGoogle Scholar
  6. [BDPSN96]
    Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R.: Security in Databases: A Survey Study, February 1996, pp. 1–39 (1996),
  7. [BHAE00]
    Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: An access control model for video database systems. In: CIKM, pp. 336–343 (2000)Google Scholar
  8. [BJS95]
    Bertino, E., Jajodia, S., Samarati, P.: Database Security - Research and Practice. Information Systems 20(7), 537–556 (1995)CrossRefGoogle Scholar
  9. [BP76]
    Bell, D.E., La Padula, L.J.: Secure Computer Systems: Unified exposition and Multics interpretation. Technical report, The Mitre Corp. (1976)Google Scholar
  10. [CdFvO93]
    Clementini, E., di Felice, P., van Oosterom, P.: A Small Set of Formal Topological Relationships Suitable for End-User Interaction. In: Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277–295 (1993)Google Scholar
  11. [FK92]
    Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: Proceedings of 15th National Computer Security Conference (1992)Google Scholar
  12. [GW76]
    Griffiths, P.G., Wade, B.: An authorization mechanism for a relational dabase system. ACM TODS 1(3), 243–255 (1976)CrossRefGoogle Scholar
  13. [Mag97]
    Magalhaes, G.C.: Telecommunications outside plant management throughout Brazil. In: Proc. GITA 1997 (1997)Google Scholar
  14. [PSA01]
    Park, J., Sandhu, R., Ahn, G.: Role-Based Access Control on the Web. ACM Transactions on Information and System Security 4(1), 37–71 (2001)CrossRefGoogle Scholar
  15. [Sag]
    Sagre, (accessed on April 2006)
  16. [Sas02]
    Sasaoka, L.K.: Access Control in Geographic Databases. Master’s thesis, Universidade Estadual de Campina (June 2002) (in Portuguese)Google Scholar
  17. [WHE04]
    Ye, W., Heidemann, J., Estrin, D.: Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 12(3), 493–506 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Liliana Kasumi Sasaoka
    • 1
  • Claudia Bauzer Medeiros
    • 2
  1. 1.IBM Silicon Valley LabSan JoseUSA
  2. 2.Institute of ComputingUNICAMPCampinasBrazil

Personalised recommendations