Skip to main content

Temporal Access Control

  • Reference work entry
Encyclopedia of Cryptography and Security

Synonyms

Temporal authorization models; Time-based access control

Related Concepts

Access Control Policies, Models, and Mechanisms; Authorization Model; Role-Based Access Control

Definition

Temporal Access Control is the process of granting or denying access to resources and data in a system upon evaluation of time-dependent conditions. A mechanism is provided to decide if requests for access should be granted or denied based on a set of temporal access control policies. These policies are defined according to a temporal access control modeland formalized using a policy specification language including temporal expressions. As a simple example, a temporal access control policy may grant to an employee the authorization to access the enterprise database only during her work shift, and to update a specific table only after 5 p.m. More complex temporal conditions are supported as, for example, the authorization for an employee to read data from a database table in a certain interval of...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Atluri V, Gal A (2002) An authorization model for temporal and derived data: securing information portals. ACM Trans Inf Syst Secur 5(1):62–94

    Article  Google Scholar 

  2. Bertino E, Bettini C, Ferrari E, Samarati P (1996) A temporal access control mechanism for database systems. IEEE Trans Knowl Data Eng 8(1):67–80

    Article  Google Scholar 

  3. Bertino E, Bettini C, Ferrari E, Samarati P (1998) An access control model supporting periodicity constraints and temporal reasoning. ACM Trans Database Syst 23(3):231–285

    Article  Google Scholar 

  4. Bertino E, Bonatti PA, Ferrari E (2001) TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3): 191–233

    Article  Google Scholar 

  5. Bettini C, Jajodia S, Wang XS (2000) Time granularities in databases. Data mining and temporal reasoning. Springer, Heidelberg, 230 pp

    MATH  Google Scholar 

  6. Joshi JBD, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4–23

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Bettini, C. (2011). Temporal Access Control. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_831

Download citation

Publish with us

Policies and ethics