Skip to main content

Temporal Access Control

  • Reference work entry
  • First Online:
Encyclopedia of Database Systems

Synonyms

Time-based access control

Definition

Temporal access control refers to access control service that restricts granting of authorization based on time. The authorization may be given to a subject for a particular interval or duration of time or based on the temporal characteristics of the objects being accessed. Such a need arises from the fact that a subject’s need to access a resource and the sensitivity (and hence the protection requirement) of the objects being accessed may change with time.

Historical Background

Work related to temporal access control has only a brief history and goes back to early 1990s. In many real-world situations, access to information and resources may have to be restricted based on time as the subject and object characteristics may change and so can the need for the subject to access the object. For example, in a hospital, the head of the hospital may need to grant the permissions related to a part-time doctor only during certain time intervals....

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Atluri V, Gal A. An authorization model for temporal and derived data: securing information portals. ACM Trans Inf Syst Secur. 2002;5(1):62–94.

    Article  Google Scholar 

  2. Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans Database Syst. 1998;23(3):231–85.

    Article  Google Scholar 

  3. Bertino E, Bonatti PA, Ferrari E. TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur. 2001;4(3):191–233.

    Article  Google Scholar 

  4. Fu S, Xu C.-Z. A coordinated spatio-temporal access control model for mobile computing in coalition environments. In: Proceeding of 19th IEEE International Parallel and Distributed Processing Symposium – Workshop 17; 2005. 18:289.2.

    Google Scholar 

  5. Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng. 2005;17(1):4–23.

    Article  Google Scholar 

  6. Ray I, Kumar M, Yu L. LRBAC: a location-aware role-based access control model. In: Proceedings of the 2nd International Conference on Information Systems Security; 2006. p. 147–61.

    Google Scholar 

  7. Ray I, Toahchoodee M. A spatio-temporal role-based access control model. In: Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security; 2007. p. 420–31.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Zhang .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Zhang, Y., Joshi, J.B.D. (2018). Temporal Access Control. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_385

Download citation

Publish with us

Policies and ethics