Abstract
The problem of access control in databases consists of determining when (and if) users or applications can access stored data, and what kind of access they are allowed. This paper discusses this problem for geographic databases, where constraints imposed on access control management must consider the spatial location context. The model and solution provided are motivated by problems found in AM/FM applications developed in the management of telephone infrastructure in Brazil, in a real life situation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ashby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D.: Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria. Technical Report 001-005, National Computer Security Center, 75 pages (1996)
Belussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A.: An Authorization Model for Geographical Maps. In: Proc. 14th ACM GIS, November 2004, pp. 82–91 (2004)
Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security 4(3), 191–223 (2001)
Bertino, E., Catania, B., Damiani, M., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: Proc., 10th ACM Symposium on Access Control, June 2005, pp. 29–37 (2005)
Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and enforcing access control policies for XML document sources. World Wide Web 3(3), 139–151 (2000)
Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R.: Security in Databases: A Survey Study, February 1996, pp. 1–39 (1996), http://citeseer.nj.nec.com/baraani-dastjerdi96security.html
Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: An access control model for video database systems. In: CIKM, pp. 336–343 (2000)
Bertino, E., Jajodia, S., Samarati, P.: Database Security - Research and Practice. Information Systems 20(7), 537–556 (1995)
Bell, D.E., La Padula, L.J.: Secure Computer Systems: Unified exposition and Multics interpretation. Technical report, The Mitre Corp. (1976)
Clementini, E., di Felice, P., van Oosterom, P.: A Small Set of Formal Topological Relationships Suitable for End-User Interaction. In: Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277–295 (1993)
Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: Proceedings of 15th National Computer Security Conference (1992)
Griffiths, P.G., Wade, B.: An authorization mechanism for a relational dabase system. ACM TODS 1(3), 243–255 (1976)
Magalhaes, G.C.: Telecommunications outside plant management throughout Brazil. In: Proc. GITA 1997 (1997)
Park, J., Sandhu, R., Ahn, G.: Role-Based Access Control on the Web. ACM Transactions on Information and System Security 4(1), 37–71 (2001)
Sagre, http://www.cpqdusa.com/solutions/outside.html (accessed on April 2006)
Sasaoka, L.K.: Access Control in Geographic Databases. Master’s thesis, Universidade Estadual de Campina (June 2002) (in Portuguese)
Ye, W., Heidemann, J., Estrin, D.: Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 12(3), 493–506 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sasaoka, L.K., Medeiros, C.B. (2006). Access Control in Geographic Databases. In: Roddick, J.F., et al. Advances in Conceptual Modeling - Theory and Practice. ER 2006. Lecture Notes in Computer Science, vol 4231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908883_14
Download citation
DOI: https://doi.org/10.1007/11908883_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47703-7
Online ISBN: 978-3-540-47704-4
eBook Packages: Computer ScienceComputer Science (R0)