Skip to main content

Access Control in Geographic Databases

  • Conference paper
Book cover Advances in Conceptual Modeling - Theory and Practice (ER 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4231))

Included in the following conference series:

Abstract

The problem of access control in databases consists of determining when (and if) users or applications can access stored data, and what kind of access they are allowed. This paper discusses this problem for geographic databases, where constraints imposed on access control management must consider the spatial location context. The model and solution provided are motivated by problems found in AM/FM applications developed in the management of telephone infrastructure in Brazil, in a real life situation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D.: Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria. Technical Report 001-005, National Computer Security Center, 75 pages (1996)

    Google Scholar 

  2. Belussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A.: An Authorization Model for Geographical Maps. In: Proc. 14th ACM GIS, November 2004, pp. 82–91 (2004)

    Google Scholar 

  3. Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security 4(3), 191–223 (2001)

    Article  Google Scholar 

  4. Bertino, E., Catania, B., Damiani, M., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: Proc., 10th ACM Symposium on Access Control, June 2005, pp. 29–37 (2005)

    Google Scholar 

  5. Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and enforcing access control policies for XML document sources. World Wide Web 3(3), 139–151 (2000)

    Article  MATH  Google Scholar 

  6. Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R.: Security in Databases: A Survey Study, February 1996, pp. 1–39 (1996), http://citeseer.nj.nec.com/baraani-dastjerdi96security.html

  7. Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: An access control model for video database systems. In: CIKM, pp. 336–343 (2000)

    Google Scholar 

  8. Bertino, E., Jajodia, S., Samarati, P.: Database Security - Research and Practice. Information Systems 20(7), 537–556 (1995)

    Article  Google Scholar 

  9. Bell, D.E., La Padula, L.J.: Secure Computer Systems: Unified exposition and Multics interpretation. Technical report, The Mitre Corp. (1976)

    Google Scholar 

  10. Clementini, E., di Felice, P., van Oosterom, P.: A Small Set of Formal Topological Relationships Suitable for End-User Interaction. In: Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277–295 (1993)

    Google Scholar 

  11. Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: Proceedings of 15th National Computer Security Conference (1992)

    Google Scholar 

  12. Griffiths, P.G., Wade, B.: An authorization mechanism for a relational dabase system. ACM TODS 1(3), 243–255 (1976)

    Article  Google Scholar 

  13. Magalhaes, G.C.: Telecommunications outside plant management throughout Brazil. In: Proc. GITA 1997 (1997)

    Google Scholar 

  14. Park, J., Sandhu, R., Ahn, G.: Role-Based Access Control on the Web. ACM Transactions on Information and System Security 4(1), 37–71 (2001)

    Article  Google Scholar 

  15. Sagre, http://www.cpqdusa.com/solutions/outside.html (accessed on April 2006)

  16. Sasaoka, L.K.: Access Control in Geographic Databases. Master’s thesis, Universidade Estadual de Campina (June 2002) (in Portuguese)

    Google Scholar 

  17. Ye, W., Heidemann, J., Estrin, D.: Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 12(3), 493–506 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sasaoka, L.K., Medeiros, C.B. (2006). Access Control in Geographic Databases. In: Roddick, J.F., et al. Advances in Conceptual Modeling - Theory and Practice. ER 2006. Lecture Notes in Computer Science, vol 4231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908883_14

Download citation

  • DOI: https://doi.org/10.1007/11908883_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47703-7

  • Online ISBN: 978-3-540-47704-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics