Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Temporal Access Control

  • Yue ZhangEmail author
  • James B. D. Joshi
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_385


Time-based access control


Temporal access control refers to access control service that restricts granting of authorization based on time. The authorization may be given to a subject for a particular interval or duration of time or based on the temporal characteristics of the objects being accessed. Such a need arises from the fact that a subject’s need to access a resource and the sensitivity (and hence the protection requirement) of the objects being accessed may change with time.

Historical Background

Work related to temporal access control has only a brief history and goes back to early 1990s. In many real-world situations, access to information and resources may have to be restricted based on time as the subject and object characteristics may change and so can the need for the subject to access the object. For example, in a hospital, the head of the hospital may need to grant the permissions related to a part-time doctor only during certain time intervals....

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Atluri V, Gal A. An authorization model for temporal and derived data: securing information portals. ACM Trans Inf Syst Secur. 2002;5(1):62–94.CrossRefGoogle Scholar
  2. 2.
    Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans Database Syst. 1998;23(3):231–85.CrossRefGoogle Scholar
  3. 3.
    Bertino E, Bonatti PA, Ferrari E. TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur. 2001;4(3):191–233.CrossRefGoogle Scholar
  4. 4.
    Fu S, Xu C.-Z. A coordinated spatio-temporal access control model for mobile computing in coalition environments. In: Proceeding of 19th IEEE International Parallel and Distributed Processing Symposium – Workshop 17; 2005. 18:289.2.Google Scholar
  5. 5.
    Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng. 2005;17(1):4–23.CrossRefGoogle Scholar
  6. 6.
    Ray I, Kumar M, Yu L. LRBAC: a location-aware role-based access control model. In: Proceedings of the 2nd International Conference on Information Systems Security; 2006. p. 147–61.Google Scholar
  7. 7.
    Ray I, Toahchoodee M. A spatio-temporal role-based access control model. In: Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security; 2007. p. 420–31.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.University of PittsburghPittsburghUSA

Section editors and affiliations

  • Richard T. Snodgrass
    • 1
  • Christian S. Jensen
    • 2
  1. 1.University of ArizonaTucsonUSA
  2. 2.Aalborg UniversityAalborg ØstDenmark