Skip to main content

Temporal Access Control

  • Reference work entry
Encyclopedia of Database Systems

Synonyms

Time-based access control

Definition

Temporal access control refers to access control service that restricts granting of authorization based on time. The authorization may be given to a subject for a particular interval or duration of time or based on the temporal characteristics of the objects being accessed. Such a need arises from the fact that a subject’s need to access a resource and the sensitivity (and hence the protection requirement) of the objects being accessed may change with time.

Historical Background

Work related to temporal access control has only a brief history and goes back to early 1990s. In many real-world situations, access to information and resources may have to be restricted based on time as the subject and object characteristics may change and so can the need for the subject to access the object. For example, in a hospital, the head of the hospital may need to grant the permissions related to a part-time doctor only during certain time intervals....

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Atluri V. and Gal A. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur., 5(1):62–94, 2002.

    Article  Google Scholar 

  2. Bertino E., Bettini C., Ferrari E., and Samarati P. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst., 23(3):231–285, 1998.

    Article  Google Scholar 

  3. Bertino E., Bonatti P.A., and Ferrari E. TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191–233, 2001.

    Article  Google Scholar 

  4. Fu S. and Xu C.-Z. 2005, A coordinated spatio-temporal access control model for mobile computing in coalition environments. In Proc. 19th IEEE Int. Parallel and Distributed Processing Sym. – Workshop 17, vol. 18, p.289.2.

    Google Scholar 

  5. Joshi J.B.D., Bertino E., Latif U., and Ghafoor A. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng., 17(1):4–23, 2005.

    Article  Google Scholar 

  6. Ray I., Kumar M., and Yu L. LRBAC: a location-aware role-based access control model. In Proc. 2nd Int. Conf. on Information Systems Security, 2006, pp. 147–161.

    Google Scholar 

  7. Ray I. and Toahchoodee M. A spatio-temporal role-based access control model. In Proc. 21st Annual IFIP WG 11.3 Working Conf. on Data and Applications Security, 2007, pp. 420–431.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

Zhang, Y., Joshi, J.B.D. (2009). Temporal Access Control. In: LIU, L., ÖZSU, M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-39940-9_385

Download citation

Publish with us

Policies and ethics