Skip to main content

The Research for Spatial Role-Based Access Control Model

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6019))

Abstract

The Spatial Role-Based Access Control (SRBAC) model was discussed in this paper. Firstly, the formal definition of SRBAC Model was given; then the region coverage constraint of spatial object, duration constraint of spatial object, various spatial object separations of duty constraints and spatial object cardinality constraint of role activation were researched; after extending the traditional session, the strategy of eliminating the conflictive session was presented; Finally, the role hierarchy has been discussed under the spatial environment. Combined with practical application, the theory of secure DBMS was optimized and afforded to build the stricter system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R.S., Conye, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE computer 29(2), 38–47 (1996)

    Google Scholar 

  2. Osborn, S.L., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans Information and System Security 3(2) (February 2000)

    Google Scholar 

  3. Richard Kuhn, D.: Role based access control on MLS systems without kernel changes. In: Proc. of the third ACM Workshop on Role-Based Access Control , Fairfax, Virginia, United States, October 22-23, pp. 25–32 (1998)

    Google Scholar 

  4. Osborn, S.: Mandatory access control and role-based access control revisited. In: Proc of the Second ACM Workshop on Role-Based Access Control, Fairfa, Virginia, United States, November 06-07, pp. 31–40 (1997)

    Google Scholar 

  5. Ferraiolo, D.F., Sandhu, R., Gavrila, S.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)

    Article  Google Scholar 

  6. Hansen, F., Oleshchuk, V.: Spatial Role-Based Access Control Model for Wireless Networks. IEEE, Los Alamitos (2003)

    Google Scholar 

  7. Hansen, F., Oleshchuk, V.: SRBAC: a spatial role-based access control model for mobile systems. In: Proceedings of the 7th Nordic Workshop on Secure IT Systems, Norway (2003)

    Google Scholar 

  8. Ray, I., Yu, L.: Short paper: towards a location-aware role-based access control model. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 234–236. IEEE Computer Society, Athens (2005)

    Chapter  Google Scholar 

  9. Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Kolkata (2006)

    Chapter  Google Scholar 

  10. Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: SACMAT 2005, pp. 29–37 (2005)

    Google Scholar 

  11. Hong, Z., Yeping, H., Zhiguo, S.: A formal model for access control with supporting spatial context. Science in China Series F: Information Sciences 50, 419–439 (2007) (In Chinese)

    Article  MATH  Google Scholar 

  12. Cui, X., Chen, Y., Gu, J.: Ex-RBAC: An extended role based access control model for location-aware mobile collaboration system. In: Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), pp. 36–41. IEEE Computer Society, Silicon Valley (2007)

    Chapter  Google Scholar 

  13. Sandhu, R.: Role activation hierarchies. In: Proceddings of 2rd Acm Workshop on Role-based Access Control, Fairfax, Virginia, October 22-23, pp. 65–79 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zou, Z., Chen, C., Ju, S., Chen, J. (2010). The Research for Spatial Role-Based Access Control Model. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6019. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12189-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12189-0_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12188-3

  • Online ISBN: 978-3-642-12189-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics