Definition
Geospatial security models refer to formal approaches to control access either to geospatial entities (objects), i.e., data and application with geospatial references, such as maps, satellite images of earth, business data targeted to a certain region, government statistics of different areas, or to any resources by the users (subjects) based on his or her geospatial location. These georeferenced data or applications are referred to as geospatial objects, and georeferenced users are referred to as geospatial subject. Geospatial security models thus consider the geographic location, and geographic features as a primary feature in the access control to the objects. In addition to the...
This is a preview of subscription content, log in via an institution.
References
Ardagna CA, Cremonini M, Damiani E, De Capitani di Vimercati S, Samarati P (2006) Supporting location-based conditions in access control policies. In: Proceedings of ASIACCS’06, Taipei, 21–24 Mar 2006
Atluri V, Chun SA (2004) An authorization model for geospatial data. IEEE Trans Dependable Secur Comput 1:238–254
Atluri V, Chun SA (2007, in press) A geotemporal role-based authorization system. Int J Inf Comput Secur
Baker JC, O’Connell KM, Willamson RA (eds) (2001) Commercial observation satellites – at the leading edge of global transparency. Rand Corporation, Arlington
Baker JC, Lachman BE, Frelinger DR, O’Connell K, Hou A, Tseng M, Orletzky D, Yost C (2004) Mapping the risks: assessing the homeland security implications of publicly available geospatial information. Rand Corporation, Santa Monica
Bossler JD, Jensen JR, McMaster RB, Rizos C (eds) (2002) Manual of geospatial science and technology. Taylor and Francis, London
Belussi A, Bertino E, Catania B, Damiani ML, Nucita A (2004) An authorization model for geographical maps. In: Proceedings of the 12th ACM international workshop on geographic information systems (ACM-GIS), Washington, DC, 12–13 Nov 2004
Bertino E, Damiani ML, Momini D (2004) An access control system for a web map management service. In: Proceedings of the 14th international workshop on research issues on data engineering (RIDE ’04), Boston, 28–29 Mar 2004
Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: Proceedings of the tenth symposium of ACM access control technologies (SACMAT ’05), Scandic Hasselbacken, Stockholm, 1–3 June 2005
Chun SA, Atluri V (2000) Protecting privacy from continuous high-resolution satellite surveillance. In: Proceedings of the 14th IFIP 11.3 working conference on database security (IFIP WG11.3 2000), Scoorl, 21–23 Aug 2000, pp 399–420
Covington MJ, Long W, Srinivasan S, Dev AK, Ahamad M, Abowd GD (2001) Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on access control models and technologies (SACMAT ’01), Litton-TASC, Chantilly, 3–4 May 2001
Covington HJ, Fogla P, Zhan Z, Ahamad M (2002) A context-aware security architecture for emerging applications. In: Proceedings of the 18th annual computer security applications conference (ACSAC ’02), Miami Beach, 10–14 Dec 2007
Denning DE, MacDoran PF (1996) Location-based authentication: grounding cyberspace for better security. Comput Fraud Secur Bull 1996:12–16
Federal Geographic Data Committee (1998) Geospatial metadata standards. http://www.fgdc.gov/metadata/geospatial-metadata-standards. Accessed 23 Mar 2007
OpenGIS Consortium (2006) OpenGIS web map service implementation specification. http://www.opengeospatial.org/standards/wms. Accessed 23 Mar 2007
Space Imaging Middle East (2004) http://www.spaceimagingme.com/content/faq/Questions/index.asp. Accessed 23 Mar 2007
Wright R (1999) Private eyes. NY Times Mag Final Sect 6(1):50
Ye N (2003) Handbook of data mining. Laurence Earlbaum, Mahwah
Zhang G, Parashar M (2003) Dynamic context-aware access control for grid applications In: Proceedings of GRID, Phoenix, 17 Nov 2003
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this entry
Cite this entry
Chun, S.A., Atluri, V. (2016). Security Models, Geospatial. In: Shekhar, S., Xiong, H., Zhou, X. (eds) Encyclopedia of GIS. Springer, Cham. https://doi.org/10.1007/978-3-319-23519-6_1178-2
Download citation
DOI: https://doi.org/10.1007/978-3-319-23519-6_1178-2
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Online ISBN: 978-3-319-23519-6
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering