Skip to main content

Foundation for a Time Interval Access Control Model

  • Conference paper
Book cover Computer Network Security (MMM-ACNS 2005)

Abstract

A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a “time interval access graph.” The time interval access graph is used to define constraints on the temporal relations between subjects and objects. Interval algebra is used to define and analyze the time interval access graph.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Afinidad, F.B.: An Interval Algebra-Based Temporal Access Control Protection Architecture. Dissertation, Naval Postgraduate School, Monterey, CA (2005)

    Google Scholar 

  2. Afinidad, F.B., Levin, T.E., Irvine, C.E., Nguyen, T.D.: Toward Building A Time Interval Access Control (TIAC) Model. Naval Postgraduate School, NPS Technical Report NPS-CS-05-006 (June 2005)

    Google Scholar 

  3. Allen, J.F.: Maintaining Knowledge About Temporal Intervals. Communications of the ACM 26(11), 832–843 (1983)

    Article  MATH  Google Scholar 

  4. Atluri, V., Gal, A.: An Authorization Model for Temporal and Derived Data: Securing Information Portals. ACM Transactions on Information and System Security 5(1), 62–94 (2002)

    Article  Google Scholar 

  5. Bertino, E., Bettini, C., Samarati, P.: A Discretionary Access Control Model with Temporal Authorizations. In: Proceedings of the 1994 Workshop on New Security Paradigms, pp. 102–107 (1994)

    Google Scholar 

  6. Bertino, E., Bettini, C., Samarati, P.: A Temporal Authorization Model. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 126–135 (1994)

    Google Scholar 

  7. Gal, A., Atluri, V.: An Authorization Model for Temporal Data. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, November 1-4, pp. 144–153 (2000)

    Google Scholar 

  8. Graham, G.S., Denning, P.J.: Protection – Principles and Practice. In: Proceedings of the Spring Joint Computer Conference, May 16–18, pp. 417–429 (1972)

    Google Scholar 

  9. Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, March 1971, pp. 437–443 (1971); reprinted in Operating Systems Review 8(1), 18–24 (January 1974)

    Google Scholar 

  10. Weissman, C.: Security Controls in the ADEPT-50 Time-Sharing System. In: Proceedings of the Fall Joint Computer Conference, November 18–20, pp. 119–133 (1969)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Afinidad, F.B., Levin, T.E., Irvine, C.E., Nguyen, T.D. (2005). Foundation for a Time Interval Access Control Model. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_31

Download citation

  • DOI: https://doi.org/10.1007/11560326_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29113-8

  • Online ISBN: 978-3-540-31998-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics