Skip to main content

STRoBAC – Spatial Temporal Role Based Access Control

  • Conference paper
Computational Collective Intelligence. Technologies and Applications (ICCCI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7654))

Included in the following conference series:

Abstract

The development of geography-based services and systems has created the demands in which access control is the primary concern for geospatial data security. Although there are a variety of models to manage geospatial data access, none of them can fulfil the access control requirements. The objective of this paper is to propose a model that can support both spatio-temporal aspects and other contextual conditions as well as access control based on the role of subject. We call this model Spatial Temporal Role Based Access Control (STRoBAC). In addition, we propose an extension of GeoXACML framework, which is highly scalable and can help in declaring and enforcing various types of rules, to support the proposed model. This is the crucial contribution of our research compared to the existing approaches and models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chun, S.A., Atluri, V.: Geospatial Database Security. In: Gertz, M., Jajodia, S. (eds.) Hand Book of DB Security App. and Trends, pp. 247–248. Springer (2007)

    Google Scholar 

  2. Cuppens, F., Boulahia, N.C.: Modeling Contextual Security Policies. International Journal of Information Security 7(4), 285–305 (2008)

    Article  Google Scholar 

  3. Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: A Spatially Aware RBAC. ACM Trans. on Info. and System Security 10(1) (2007)

    Google Scholar 

  4. E.J. XACML (June 2012), http://code.google.com/p/enterprise-java-xacml/

  5. Haidar, D.A., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: An Extended RBAC Profile of XACML. In: 3rd ACM Workshop on Secure Web Services, pp. 13–22 (2006)

    Google Scholar 

  6. HERAS-AF (June 2012), http://www.herasaf.org/

  7. Kumar, M., Newman, R.E.: STRBAC – An Approach Towards Spatio-Temporal Role-Based Access Control. In: Communication, Network and Information Security, USA, pp. 150–155 (2006)

    Google Scholar 

  8. Le, T.K.T., Tran, T.Q.N., Dang, T.K.: An Enhanced Access Control Model for GIS Database Security. In: 4th Regional Conference on Information and Communication Technology, Vietnam, pp. 129–136 (2011)

    Google Scholar 

  9. Lin, J., Fang, Y., Chen, B., Wu, P.: Analysis of Access Control Mechanisms for Spatial Database. In: ISPRS (2008)

    Google Scholar 

  10. Matheus, A.: Declaration and Enforcement of Access Restrictions for Distributed Geospatial Information Objects, Master Thesis, Fakultät für Informatik Technische Universität München (2005)

    Google Scholar 

  11. Matheus, A.: GeoXACML, A Spatial Extension to XACML. The Federal Armed Forces Germany Univ., Discussion paper 05-036 (June 16, 2005)

    Google Scholar 

  12. OASIS Brief Introduction to XACML (April 2012), http://www.oasis-open.org/committees/download.php/2713/Brief_Introduction_to_XACML.html

  13. OASIS Differences between XACML 2.0 and XACML 3.0 (April 2012), http://wiki.oasis-open.org/xacml/DifferencesBetweenXACML2.0AndXACML3.0

  14. OASIS XACML (April 2012), http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml#CURRENT

  15. OASIS XACML 2.0 Core Specification (April 2012), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf

  16. OASIS XACML 3.0 Core Specification (April 2012), http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf

  17. OASIS XACML 3.0 and Core Hierarchical Role Based Access Control (April 2012), http://docs.oasis-open.org/xacml/3.0/xacml-3.0-rbac-v1-spec-cs-01-en.pdf

  18. OGC GeoXACML (April 2012), http://www.opengeospatial.org/standards/geoxacml

  19. Sophat, S.: Fundamentals of Geographic Information Systems. Royal University of Phnom Penh (2007)

    Google Scholar 

  20. Sun’s XACML (June 2012), http://sunxacml.sourceforge.net

  21. Tran, T.Q.N., Dang, T.K.: X-STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL. In: 7th International Conference on Digital Information Management, Macau (to appear, 2012)

    Google Scholar 

  22. XACMLight (June 2012), http://sourceforge.net/projects/xacmllight/

  23. What is GIS (October 2011), http://www.gis.com/content/what-gis

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Le Thi, K.T., Dang, T.K., Kuonen, P., Drissi, H.C. (2012). STRoBAC – Spatial Temporal Role Based Access Control. In: Nguyen, NT., Hoang, K., Jȩdrzejowicz, P. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2012. Lecture Notes in Computer Science(), vol 7654. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34707-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34707-8_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34706-1

  • Online ISBN: 978-3-642-34707-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics