Abstract
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a “time interval access graph.” The time interval access graph is used to define constraints on the temporal relations between subjects and objects. Interval algebra is used to define and analyze the time interval access graph.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Afinidad, F.B.: An Interval Algebra-Based Temporal Access Control Protection Architecture. Dissertation, Naval Postgraduate School, Monterey, CA (2005)
Afinidad, F.B., Levin, T.E., Irvine, C.E., Nguyen, T.D.: Toward Building A Time Interval Access Control (TIAC) Model. Naval Postgraduate School, NPS Technical Report NPS-CS-05-006 (June 2005)
Allen, J.F.: Maintaining Knowledge About Temporal Intervals. Communications of the ACM 26(11), 832–843 (1983)
Atluri, V., Gal, A.: An Authorization Model for Temporal and Derived Data: Securing Information Portals. ACM Transactions on Information and System Security 5(1), 62–94 (2002)
Bertino, E., Bettini, C., Samarati, P.: A Discretionary Access Control Model with Temporal Authorizations. In: Proceedings of the 1994 Workshop on New Security Paradigms, pp. 102–107 (1994)
Bertino, E., Bettini, C., Samarati, P.: A Temporal Authorization Model. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 126–135 (1994)
Gal, A., Atluri, V.: An Authorization Model for Temporal Data. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, November 1-4, pp. 144–153 (2000)
Graham, G.S., Denning, P.J.: Protection – Principles and Practice. In: Proceedings of the Spring Joint Computer Conference, May 16–18, pp. 417–429 (1972)
Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, March 1971, pp. 437–443 (1971); reprinted in Operating Systems Review 8(1), 18–24 (January 1974)
Weissman, C.: Security Controls in the ADEPT-50 Time-Sharing System. In: Proceedings of the Fall Joint Computer Conference, November 18–20, pp. 119–133 (1969)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Afinidad, F.B., Levin, T.E., Irvine, C.E., Nguyen, T.D. (2005). Foundation for a Time Interval Access Control Model. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_31
Download citation
DOI: https://doi.org/10.1007/11560326_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)