IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Modelling of Location-Aware Access Control Rules

Modelling of Location-Aware Access Control Rules
View Sample PDF
Author(s): Michael Decker (Karlsruhe Institute of Technology (KIT), Germany)
Copyright: 2011
Pages: 18
Source title: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal) and Fernando Moreira (Portucalense University, Portugal)
DOI: 10.4018/978-1-60960-042-6.ch057

Purchase

View Modelling of Location-Aware Access Control Rules on the publisher's website for pricing and purchasing information.

Abstract

Access control in the domain of information system security refers to the process of deciding whether a particular request made by a user to perform a particular operation on a particular object under the control of the system should be allowed or denied. For example, the access control component of a file server might have to decide whether user “Alice” is allowed to perform the operation “delete” on the object “document.txt”. For traditional access control this decision is based on the evaluation of the identity of the user and attributes of the object. The novel idea of location-aware access control is also to consider the user’s current location which is determined by a location system like GPS. The main purpose of this article is to present several approaches for the modeling of location-aware access control rules. We consider generic as well as application-specific access control models that can be found in literature.

Related Content

. © 2019. 17 pages.
. © 2019. 21 pages.
. © 2019. 23 pages.
. © 2019. 25 pages.
. © 2019. 17 pages.
. © 2019. 31 pages.
. © 2019. 20 pages.
Body Bottom