Encyclopedia of GIS

2017 Edition
| Editors: Shashi Shekhar, Hui Xiong, Xun Zhou

Geospatial Authorizations, Efficient Enforcement

  • Vijay Atluri
  • Heechang Shin
Reference work entry
DOI: https://doi.org/10.1007/978-3-319-17885-1_503



Enforcing security often incurs overheads, and as a result may degrade performance. The problem is exasperated more in geospatial data, which includes, among other things, geospatial image data and moving-object data. Uncontrolled dissemination of geospatial image data may have grave implications for national security and personal privacy. This is because high resolution satellite imagery may be used to identify vital national resources. As a result, this could encourage industrial espionage, terrorism, or cross-border military attacks, and combination of publicly available personal data pools with high resolution image data. This, coupled with the integration and analysis capabilities of modern geographic information systems, can result in a technological invasion of personal privacy....

This is a preview of subscription content, log in to check access.


  1. Atluri V, Chun S (2004) An authorization model for geospatial data. IEEE Trans Dependable Sec Comput 1:238–254CrossRefGoogle Scholar
  2. Atluri V, Guo Q (2004) STAR-tree: an index structure for efficient evaluation of spatiotemporal authorizations. In: IFIP TC11/WG 11.3 eighteenth annual conference on data and applications security, Sitges, Catalonia, 25–28 2004Google Scholar
  3. Atluri V, Guo Q (2005) Unified index for mobile object data and authorizations. In: ESORICS, Milan, 12–14 2005Google Scholar
  4. Atluri V, Mazzoleni P (2002) Uniform indexing for geospatial data and authorizations. In: DBSec, Kings College, Cambridge, 28–31 July 2002Google Scholar
  5. Atluri V, Shin H (2006) Efficient enforcement of security policies based on tracking of mobile users. In: DBSec, Sophia, Antipolis, 31 Aug 2006Google Scholar
  6. Atluri V, Adam N, Youssef M (2003) Towards a unified index scheme for mobile data and customer profiles in a location-based service environment. In: Proceedings of the workshop on next generation geospatial information (NG2I’03), Cambridge, 19–21 Oct 2003Google Scholar
  7. Belussi A, Bertino E, Catania B, Damiani M, Nucita A (2004) An authorization model for geographical maps. In: GIS, Washington, DC, 12–13 Nov 2004Google Scholar
  8. Bertino E, Damiani M, Momini D (2004) An access control system for a web map management service. In: RIDE, Boston, 28–29 Mar 2004Google Scholar
  9. Guttman A (1984) R-trees a dynamic index structure for spatial searching. In: ACM SIGMOD conference, Boston, 18–21 1984Google Scholar
  10. Pelanis M, Saltenis S, Jensen CS (2006) Indexing the past, present and anticipated future positions of moving objects. ACM Trans Database Syst 31(1):255–298. doi:10.1145/1132863.1132870CrossRefGoogle Scholar
  11. Saltenis S, Jensen C, Leutenegger S, Lopez M (2000) Indexing the positions of continuously moving objects. In: Proceedings of the 2000 ACM SIGMOD international conference on management of data, Dallas, 14–19 2000Google Scholar
  12. Youssef M, Adam N, Atluri V (2005) Preserving mobile customer privacy: an access control system for moving objects and customer information. In: International conference on mobile data management, Ayia Napa, 9–13 May 2005. Lecture notes in computer scienceGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.NewarkNJUSA
  2. 2.Department of Management Science & Information SystemsRutgers UniversityNewarkUSA