Skip to main content

Access Control in Geographic Databases

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNCS,volume 4231)

Abstract

The problem of access control in databases consists of determining when (and if) users or applications can access stored data, and what kind of access they are allowed. This paper discusses this problem for geographic databases, where constraints imposed on access control management must consider the spatial location context. The model and solution provided are motivated by problems found in AM/FM applications developed in the management of telephone infrastructure in Brazil, in a real life situation.

Keywords

  • Access Control
  • Spatial Object
  • Access Control Model
  • Access Request
  • Subway Station

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/11908883_14
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-47704-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   129.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D.: Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria. Technical Report 001-005, National Computer Security Center, 75 pages (1996)

    Google Scholar 

  2. Belussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A.: An Authorization Model for Geographical Maps. In: Proc. 14th ACM GIS, November 2004, pp. 82–91 (2004)

    Google Scholar 

  3. Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security 4(3), 191–223 (2001)

    CrossRef  Google Scholar 

  4. Bertino, E., Catania, B., Damiani, M., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: Proc., 10th ACM Symposium on Access Control, June 2005, pp. 29–37 (2005)

    Google Scholar 

  5. Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and enforcing access control policies for XML document sources. World Wide Web 3(3), 139–151 (2000)

    MATH  CrossRef  Google Scholar 

  6. Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R.: Security in Databases: A Survey Study, February 1996, pp. 1–39 (1996), http://citeseer.nj.nec.com/baraani-dastjerdi96security.html

  7. Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: An access control model for video database systems. In: CIKM, pp. 336–343 (2000)

    Google Scholar 

  8. Bertino, E., Jajodia, S., Samarati, P.: Database Security - Research and Practice. Information Systems 20(7), 537–556 (1995)

    CrossRef  Google Scholar 

  9. Bell, D.E., La Padula, L.J.: Secure Computer Systems: Unified exposition and Multics interpretation. Technical report, The Mitre Corp. (1976)

    Google Scholar 

  10. Clementini, E., di Felice, P., van Oosterom, P.: A Small Set of Formal Topological Relationships Suitable for End-User Interaction. In: Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277–295 (1993)

    Google Scholar 

  11. Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: Proceedings of 15th National Computer Security Conference (1992)

    Google Scholar 

  12. Griffiths, P.G., Wade, B.: An authorization mechanism for a relational dabase system. ACM TODS 1(3), 243–255 (1976)

    CrossRef  Google Scholar 

  13. Magalhaes, G.C.: Telecommunications outside plant management throughout Brazil. In: Proc. GITA 1997 (1997)

    Google Scholar 

  14. Park, J., Sandhu, R., Ahn, G.: Role-Based Access Control on the Web. ACM Transactions on Information and System Security 4(1), 37–71 (2001)

    CrossRef  Google Scholar 

  15. Sagre, http://www.cpqdusa.com/solutions/outside.html (accessed on April 2006)

  16. Sasaoka, L.K.: Access Control in Geographic Databases. Master’s thesis, Universidade Estadual de Campina (June 2002) (in Portuguese)

    Google Scholar 

  17. Ye, W., Heidemann, J., Estrin, D.: Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 12(3), 493–506 (2004)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sasaoka, L.K., Medeiros, C.B. (2006). Access Control in Geographic Databases. In: , et al. Advances in Conceptual Modeling - Theory and Practice. ER 2006. Lecture Notes in Computer Science, vol 4231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908883_14

Download citation

  • DOI: https://doi.org/10.1007/11908883_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47703-7

  • Online ISBN: 978-3-540-47704-4

  • eBook Packages: Computer ScienceComputer Science (R0)