skip to main content
10.1145/1063979.1063983acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure

Published: 01 June 2005 Publication History

Abstract

This work describes the declaration and enforcement of geospatial access restrictions for the infrastructure of heterogenous and distributed geospatial information objects, as they are accessible via the service-oriented geospatial data infrastructure (GDI). Assuming a valid XML markup of the objects and their geometry using the Geographic Markup Language (GML), which is an international standard of the Open GIS Consortium, Inc. (OGC), a solution is introduced that allows the declaration and enforcement of access restrictions, encoded in GeoXACML. GeoXACML is a geospatial extension to the OASIS standard eXtensible Access Control Markup Language (XACML). Due to the nature of the introduced restrictions, the declaration of access restrictions can result in different kinds of inconsistencies. This work describes a mechanism for the detection and classification of contrary permissions. This work also describes a prototype implementation and an illustrating demonstration.

References

[1]
The opengis abstract specification topic 0: Abstract specification overview, version 4. Open Geospatial Consortium Inc. (OGC), June 1999.
[2]
Opengis geography markup language (gml) implementation specification, version 2.1.2. Open Geospatial Consortium Inc. (OGC), September 2002.
[3]
Web feature service implementation specification, version: 1.0.0. Open Geospatial Consortium Inc. (OGC), September 2002.
[4]
Web map service implementation specification, version: 1.1.1. Open Geospatial Consortium Inc. (OGC), January 2002.
[5]
Xml access control language (xacl). IBM et. al., October 2002.
[6]
extensible access control markup language (xacml), version 1.1. Organization for the Advancement of Structured Information Standards (OASIS), July 2003.
[7]
Java topology suite implementation version 1.4. VIVID Solutions, November 2003.
[8]
Xacml implementation version 1.1. SUN microsystems, November 2003.
[9]
extensible rights markup language (xrml). Content Guard Holdings Inc., November 2004.
[10]
A. Baraani-Dastjerdi, R. Safavi-Naini, J. Perprzyk, and J. R. Getta. A model of content-based authorization in object-oriented databaseds based on object views. 1995.
[11]
E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Controlled access and dissemination of xml documents. Proceedings of the 2nd international workshop on Web information and data management, 1999.
[12]
R. Bhatti, J. B. Joshi, E. Bertino, and A. Ghafoo. Access control in dynamic xml-based web-services with x-rbac. The First International Conference on Web Services, June 2003.
[13]
J. Clark and W. Steve DeRose. Xml path language (xpath), version 1.0. November 1999.
[14]
E. Damiani, S. de Capitani Di Vimercati, S. Paraboschi, and P. Samarati. Fine grained access control for soap e-services. WWW10, May 2001.
[15]
E. Damiani, S. de Capitani Di Vimercati, S. Paraboschi, and P. Samarati. A fine-grained access control system for xml documents. ACM Transactions on Information and System Security (TISSEC), 5(2):169 -- 202, 2002.
[16]
M. J. Egenhofer and R. G. Golledge. Spatial And Temporal Reasoning In Geographic Information Systems. Oxford University Press, 1998.
[17]
S. Hada and M. Kudo. Xml access control language: Provisional authorization for xml documents. 2000.
[18]
R. Kraft. Designing a distributed access control processor for network services on the web. Proceedings of the 2002 ACM workshop on XML security, pages 36- 52, 2002.
[19]
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah. First experiences using xacml for access control in distributed systems. Proceedings of the 2003 ACM workshop on XML security, pages 25 -- 37, 2003.

Cited By

View all

Index Terms

  1. Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
      June 2005
      186 pages
      ISBN:1595930450
      DOI:10.1145/1063979
      • General Chair:
      • Elena Ferrari,
      • Program Chair:
      • Gail-Joon Ahn
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 June 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ACM proceedings
      2. XACML
      3. geospatial
      4. object-based access restriction
      5. spatial access control

      Qualifiers

      • Article

      Conference

      SACMAT05
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Roles in SQLEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_685(2127-2130)Online publication date: 8-Jan-2025
      • (2024)Roles in SQLEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_685-2(1-4)Online publication date: 1-Sep-2024
      • (2018)Declarative cartography under fine-grained access controlProceedings of the 30th International Conference on Scientific and Statistical Database Management10.1145/3221269.3232012(1-12)Online publication date: 9-Jul-2018
      • (2012)X-STROWL: A generalized extension of XACML for context-aware spatio-temporal RBAC model with OWLSeventh International Conference on Digital Information Management (ICDIM 2012)10.1109/ICDIM.2012.6360113(253-258)Online publication date: Aug-2012
      • (2012)STRoBACProceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part II10.1007/978-3-642-34707-8_21(201-211)Online publication date: 28-Nov-2012
      • (2012)Enforcing protection mechanisms for geographic dataProceedings of the 11th international conference on Web and Wireless Geographical Information Systems10.1007/978-3-642-29247-7_14(185-202)Online publication date: 12-Apr-2012
      • (2011)A flexible access control mechanism for mobile commerce2011 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE.2011.5722508(145-146)Online publication date: Jan-2011
      • (2011)A map-layer-based access control modelProceedings of the 12th international conference on Information Security Applications10.1007/978-3-642-27890-7_14(157-170)Online publication date: 22-Aug-2011
      • (2011)Roles in SQLEncyclopedia of Cryptography and Security10.1007/978-1-4419-5906-5_685(1055-1057)Online publication date: 2011
      • (2010)Security mechanisms for geographic dataProceedings of the International Conference on Management of Emergent Digital EcoSystems10.1145/1936254.1936312(297-302)Online publication date: 26-Oct-2010
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media