Skip to main content

Security Models, Geospatial

  • Living reference work entry
  • First Online:
  • 102 Accesses

Synonyms

Context-aware dynamic access control; Context-aware role-based access control; Environmentsensitive access control; Geo-role-based access control; Geospatial authorization; Geotemporal role-based access control; Location-aware access control; Spatially aware role-based access control

Definition

Geospatial security models refer to formal approaches to control access either to geospatial entities (objects), i.e., data and application with geospatial references, such as maps, satellite images of earth, business data targeted to a certain region, government statistics of different areas, or to any resources by the users (subjects) based on his or her geospatial location. These georeferenced data or applications are referred to as geospatial objects, and georeferenced users are referred to as geospatial subject. Geospatial security models thus consider the geographic location, and geographic features as a primary feature in the access control to the objects. In addition to the...

This is a preview of subscription content, log in via an institution.

References

  • Ardagna CA, Cremonini M, Damiani E, De Capitani di Vimercati S, Samarati P (2006) Supporting location-based conditions in access control policies. In: Proceedings of ASIACCS’06, Taipei, 21–24 Mar 2006

    Google Scholar 

  • Atluri V, Chun SA (2004) An authorization model for geospatial data. IEEE Trans Dependable Secur Comput 1:238–254

    Article  Google Scholar 

  • Atluri V, Chun SA (2007, in press) A geotemporal role-based authorization system. Int J Inf Comput Secur

    Google Scholar 

  • Baker JC, O’Connell KM, Willamson RA (eds) (2001) Commercial observation satellites – at the leading edge of global transparency. Rand Corporation, Arlington

    Google Scholar 

  • Baker JC, Lachman BE, Frelinger DR, O’Connell K, Hou A, Tseng M, Orletzky D, Yost C (2004) Mapping the risks: assessing the homeland security implications of publicly available geospatial information. Rand Corporation, Santa Monica

    Google Scholar 

  • Bossler JD, Jensen JR, McMaster RB, Rizos C (eds) (2002) Manual of geospatial science and technology. Taylor and Francis, London

    Google Scholar 

  • Belussi A, Bertino E, Catania B, Damiani ML, Nucita A (2004) An authorization model for geographical maps. In: Proceedings of the 12th ACM international workshop on geographic information systems (ACM-GIS), Washington, DC, 12–13 Nov 2004

    Google Scholar 

  • Bertino E, Damiani ML, Momini D (2004) An access control system for a web map management service. In: Proceedings of the 14th international workshop on research issues on data engineering (RIDE ’04), Boston, 28–29 Mar 2004

    Google Scholar 

  • Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: Proceedings of the tenth symposium of ACM access control technologies (SACMAT ’05), Scandic Hasselbacken, Stockholm, 1–3 June 2005

    Google Scholar 

  • Chun SA, Atluri V (2000) Protecting privacy from continuous high-resolution satellite surveillance. In: Proceedings of the 14th IFIP 11.3 working conference on database security (IFIP WG11.3 2000), Scoorl, 21–23 Aug 2000, pp 399–420

    Google Scholar 

  • Covington MJ, Long W, Srinivasan S, Dev AK, Ahamad M, Abowd GD (2001) Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on access control models and technologies (SACMAT ’01), Litton-TASC, Chantilly, 3–4 May 2001

    Google Scholar 

  • Covington HJ, Fogla P, Zhan Z, Ahamad M (2002) A context-aware security architecture for emerging applications. In: Proceedings of the 18th annual computer security applications conference (ACSAC ’02), Miami Beach, 10–14 Dec 2007

    Google Scholar 

  • Denning DE, MacDoran PF (1996) Location-based authentication: grounding cyberspace for better security. Comput Fraud Secur Bull 1996:12–16

    Article  Google Scholar 

  • Federal Geographic Data Committee (1998) Geospatial metadata standards. http://www.fgdc.gov/metadata/geospatial-metadata-standards. Accessed 23 Mar 2007

  • OpenGIS Consortium (2006) OpenGIS web map service implementation specification. http://www.opengeospatial.org/standards/wms. Accessed 23 Mar 2007

  • Space Imaging Middle East (2004) http://www.spaceimagingme.com/content/faq/Questions/index.asp. Accessed 23 Mar 2007

  • Wright R (1999) Private eyes. NY Times Mag Final Sect 6(1):50

    Google Scholar 

  • Ye N (2003) Handbook of data mining. Laurence Earlbaum, Mahwah

    Google Scholar 

  • Zhang G, Parashar M (2003) Dynamic context-aware access control for grid applications In: Proceedings of GRID, Phoenix, 17 Nov 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this entry

Cite this entry

Chun, S.A., Atluri, V. (2016). Security Models, Geospatial. In: Shekhar, S., Xiong, H., Zhou, X. (eds) Encyclopedia of GIS. Springer, Cham. https://doi.org/10.1007/978-3-319-23519-6_1178-2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23519-6_1178-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Online ISBN: 978-3-319-23519-6

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics