메뉴 건너뛰기




Volumn , Issue , 2008, Pages 39-45

Towards movement-aware access control

Author keywords

Geospatial data; GIS; Privacy; Security

Indexed keywords

ACCESS CONTROL MODELS; GEOSPATIAL DATA; GIS; MODELING FRAMEWORKS; MULTI DOMAINS; PERVASIVE APPLICATIONS; POSITION INFORMATION; PRIVACY; PROTECTED OBJECT; RBAC MODEL; SECURITY; SIMILAR SOLUTION;

EID: 70349098398     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1503402.1503410     Document Type: Conference Paper
Times cited : (13)

References (30)
  • 1
    • 52149089585 scopus 로고    scopus 로고
    • STARBAC: Spatio temporal Role Based Access Control
    • S. Aich, S. Sural, and A. K. Majumdar. STARBAC: Spatio temporal Role Based Access Control. In OTM Conferences, 2007.
    • (2007) OTM Conferences
    • Aich, S.1    Sural, S.2    Majumdar, A.K.3
  • 4
    • 70349105649 scopus 로고    scopus 로고
    • T. Berfall. Mobility versus security-getting the balance right. http://www.bcs.org/server.php?show=ConWebDoc.3057, 2006. Last visit: Sept. 2007.
    • T. Berfall. Mobility versus security-getting the balance right. http://www.bcs.org/server.php?show=ConWebDoc.3057, 2006. Last visit: Sept. 2007.
  • 6
    • 41649091646 scopus 로고    scopus 로고
    • Policy Mapper: A Simplified Approach for Administration of Location-based Access Control Policies
    • R. Bhatti, M. Damiani, D. Bettis, and E. Bertino. Policy Mapper: A Simplified Approach for Administration of Location-based Access Control Policies. IEEE internet Computing, 12(2), 2008.
    • (2008) IEEE internet Computing , vol.12 , Issue.2
    • Bhatti, R.1    Damiani, M.2    Bettis, D.3    Bertino, E.4
  • 7
    • 23244445557 scopus 로고    scopus 로고
    • X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
    • May
    • R. Bhatti, A. Ghafoor, E. Bertino, and J. Joshi. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security (TISSEC), 8(2): 187-227, May 2005.
    • (2005) ACM Transactions on Information and System Security (TISSEC) , vol.8 , Issue.2 , pp. 187-227
    • Bhatti, R.1    Ghafoor, A.2    Bertino, E.3    Joshi, J.4
  • 9
    • 70349104347 scopus 로고    scopus 로고
    • U. C. Bureau. http://www.census.gov/geo/www/tiger/.
    • U. C. Bureau. http://www.census.gov/geo/www/tiger/.
  • 11
    • 70349089849 scopus 로고    scopus 로고
    • Access Control Systems for Geo-spatial Data and Applications
    • E. Ferrari, A. Belussi, B. Catania, and E. Clementini, editors, Springer
    • M. Damiani and E. Bertino. Access Control Systems for Geo-spatial Data and Applications. In E. Ferrari, A. Belussi, B. Catania, and E. Clementini, editors, Spatial Data on the Web: Modeling and Management. Springer, 2007.
    • (2007) Spatial Data on the Web: Modeling and Management
    • Damiani, M.1    Bertino, E.2
  • 14
    • 55349099132 scopus 로고    scopus 로고
    • Spatial Domains for the Administration of Location-based Access Control Policies
    • DOI 10.1007/sl0922-008-9106-0, September, online
    • M. L. Damiani, E. Bertino, and C. Silvestri. Spatial Domains for the Administration of Location-based Access Control Policies. Journal of Network and Systems Management, DOI 10.1007/sl0922-008-9106-0, September 2008 (online).
    • (2008) Journal of Network and Systems Management
    • Damiani, M.L.1    Bertino, E.2    Silvestri, C.3
  • 16
    • 1542341270 scopus 로고    scopus 로고
    • Location-Based Authentication: Grounding Cyberspace for Better Security
    • Elsevier Science Ltd, February
    • D.E. Denning and F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security, Elsevier Science Ltd., February 1996.
    • (1996) Computer Fraud and Security
    • Denning, D.E.1    MacDoran, F.2
  • 18
    • 84859404584 scopus 로고    scopus 로고
    • M. Ge and S. L. Osborn. A Design for Parameterized Roles. In F. C. and S. P., editors, Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, 2004.
    • M. Ge and S. L. Osborn. A Design for Parameterized Roles. In F. C. and S. P., editors, Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, 2004.
  • 20
    • 0035424017 scopus 로고    scopus 로고
    • Location Systems for Ubiquitous Computing
    • J. Hightower and G. Boriello. Location Systems for Ubiquitous Computing. Computer, 34(8), 2001.
    • (2001) Computer , vol.34 , Issue.8
    • Hightower, J.1    Boriello, G.2
  • 22
    • 46449131175 scopus 로고    scopus 로고
    • Secure localization with phantom node detection
    • J. Hwang, T. He, and Y. Kim. Secure localization with phantom node detection. Ad Hoc Netw., 6(7): 1031-1050, 2008.
    • (2008) Ad Hoc Netw , vol.6 , Issue.7 , pp. 1031-1050
    • Hwang, J.1    He, T.2    Kim, Y.3
  • 25
    • 38049143822 scopus 로고    scopus 로고
    • STRBAC - An approach towards spatio-temporal role-based access control
    • M. Kumar and R. Newman. STRBAC - An approach towards spatio-temporal role-based access control. In Communication, Network, and Information Security, pages 150-155, 2006.
    • (2006) Communication, Network, and Information Security , pp. 150-155
    • Kumar, M.1    Newman, R.2
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.