Nothing Special   »   [go: up one dir, main page]

Skip to main content

LTAM: A Location-Temporal Authorization Model

  • Conference paper
Secure Data Management (SDM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3178))

Included in the following conference series:

Abstract

This paper describes an authorization model for specifying access privileges of users who make requests to access a set of locations in a building or more generally a physical or virtual infrastructure. In the model, primitive locations can be grouped into composite locations and the connectivities among locations are represented in a multilevel location graph. Authorizations are defined with temporal constraints on the time to enter and leave a location and constraints on the number of times users can access a location. Access control enforcement is conducted by monitoring user movement and checking access requests against an authorization database. The authorization model also includes rules that define the relationships among authorizations. We also describe the problem of finding inaccessible locations given a set of user specified authorizations and a multilevel location graph, and outline a solution algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hightower, J., Borriello, G.: A survey and taxonomy of location systems for ubiquitous computing. IEEE Computer 34, 57–66 (2001)

    Google Scholar 

  2. Pitoura, E., Samaras, G.: Locating objects in mobile computing. Knowledge and Data Engineering 13, 571–592 (2001)

    Article  Google Scholar 

  3. Awerbuch, B., Peleg, D.: Online tracking of mobile users. In: Proceedings of the ACM SIGCOMM Symposium on Communication Architectures and Protocols (1991)

    Google Scholar 

  4. RFiD Journal: Singapore fights SARS with RFID. RFiD Journal (2003), http://www.rfidjournal.com/article/articleview/446/1/1/

  5. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  6. Bertino, E., Bettini, C., Samarati, P.: A temporal authorization model. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security (CCS 1994), pp. 126–135 (1994)

    Google Scholar 

  7. Gal, A., Atluri, V.: An authorization model for temporal data. In: Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS 2000), pp. 144–153 (2000)

    Google Scholar 

  8. Atluri, V., Mazzoleni, P.: A uniform indexing scheme for geospatial data and authorizations. In: IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, DBSec 2002 (2002)

    Google Scholar 

  9. Zhang, G., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, CNDS 2004 (2004)

    Google Scholar 

  10. Jiang, X., Landay, J.A.: Modeling privacy control in context-aware systems. IEEE Pervasive Computing 1, 59–63 (2002)

    Article  Google Scholar 

  11. Michalakis, N.: PAC: Location aware access control for pervasive computing environments. In: MIT Student Oxygen Workshop (2002)

    Google Scholar 

  12. Pradhan, S.: Semantic location. HP (2002), http://cooltown.hp.com/dev/wpapers/semantic/sematnic.asp

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, H., Lim, EP. (2004). LTAM: A Location-Temporal Authorization Model. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30073-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22983-4

  • Online ISBN: 978-3-540-30073-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics