Abstract
The Spatial Role-Based Access Control (SRBAC) model was discussed in this paper. Firstly, the formal definition of SRBAC Model was given; then the region coverage constraint of spatial object, duration constraint of spatial object, various spatial object separations of duty constraints and spatial object cardinality constraint of role activation were researched; after extending the traditional session, the strategy of eliminating the conflictive session was presented; Finally, the role hierarchy has been discussed under the spatial environment. Combined with practical application, the theory of secure DBMS was optimized and afforded to build the stricter system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Sandhu, R.S., Conye, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE computer 29(2), 38–47 (1996)
Osborn, S.L., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans Information and System Security 3(2) (February 2000)
Richard Kuhn, D.: Role based access control on MLS systems without kernel changes. In: Proc. of the third ACM Workshop on Role-Based Access Control , Fairfax, Virginia, United States, October 22-23, pp. 25–32 (1998)
Osborn, S.: Mandatory access control and role-based access control revisited. In: Proc of the Second ACM Workshop on Role-Based Access Control, Fairfa, Virginia, United States, November 06-07, pp. 31–40 (1997)
Ferraiolo, D.F., Sandhu, R., Gavrila, S.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Hansen, F., Oleshchuk, V.: Spatial Role-Based Access Control Model for Wireless Networks. IEEE, Los Alamitos (2003)
Hansen, F., Oleshchuk, V.: SRBAC: a spatial role-based access control model for mobile systems. In: Proceedings of the 7th Nordic Workshop on Secure IT Systems, Norway (2003)
Ray, I., Yu, L.: Short paper: towards a location-aware role-based access control model. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 234–236. IEEE Computer Society, Athens (2005)
Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Kolkata (2006)
Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: SACMAT 2005, pp. 29–37 (2005)
Hong, Z., Yeping, H., Zhiguo, S.: A formal model for access control with supporting spatial context. Science in China Series F: Information Sciences 50, 419–439 (2007) (In Chinese)
Cui, X., Chen, Y., Gu, J.: Ex-RBAC: An extended role based access control model for location-aware mobile collaboration system. In: Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), pp. 36–41. IEEE Computer Society, Silicon Valley (2007)
Sandhu, R.: Role activation hierarchies. In: Proceddings of 2rd Acm Workshop on Role-based Access Control, Fairfax, Virginia, October 22-23, pp. 65–79 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zou, Z., Chen, C., Ju, S., Chen, J. (2010). The Research for Spatial Role-Based Access Control Model. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6019. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12189-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-12189-0_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12188-3
Online ISBN: 978-3-642-12189-0
eBook Packages: Computer ScienceComputer Science (R0)