skip to main content
10.1145/1542207.1542235acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
panel

Spatio-temporal access control: challenges and applications

Published: 03 June 2009 Publication History

Abstract

In the last few years, a number of spatial and spatio-temporal access control models have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effective those models are in real applications is still to be proved. The goal of this panel is to discuss access control requirements in mobile applications, trying to link research to real business problematic.

References

[1]
E.Bertino, M.Gertz, B.Thuraisingham, and M.L. Damiani. Security and Privacy for Geospatial Data: Concepts and Research Directions. In Proceedings of 1st ACM SigSpatial Workhop on Security and Privacy in GIS and LBS, Irvine (US), 2008.
[2]
Geopkdd. http://www.geopkdd.eu/

Cited By

View all
  • (2013)HADAProceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 201310.5555/2735338.2735339(1-11)Online publication date: 16-Sep-2013
  • (2010)Modular context-aware access control for medical sensor networksProceedings of the 15th ACM symposium on Access control models and technologies10.1145/1809842.1809864(129-138)Online publication date: 9-Jun-2010
  • (2010)Efficient and context-aware access control for pervasive medical sensor networks2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PERCOMW.2010.5470649(322-327)Online publication date: Mar-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologies
June 2009
258 pages
ISBN:9781605585376
DOI:10.1145/1542207

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 June 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile applications
  2. spatio-temporal access control model

Qualifiers

  • Panel

Conference

SACMAT '09
Sponsor:

Acceptance Rates

SACMAT '09 Paper Acceptance Rate 24 of 75 submissions, 32%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)HADAProceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 201310.5555/2735338.2735339(1-11)Online publication date: 16-Sep-2013
  • (2010)Modular context-aware access control for medical sensor networksProceedings of the 15th ACM symposium on Access control models and technologies10.1145/1809842.1809864(129-138)Online publication date: 9-Jun-2010
  • (2010)Efficient and context-aware access control for pervasive medical sensor networks2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PERCOMW.2010.5470649(322-327)Online publication date: Mar-2010
  • (2010)Benefits of Location-Based Access ControlProceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing10.1109/GreenCom-CPSCom.2010.148(739-746)Online publication date: 18-Dec-2010
  • (2010)Using Privilege Chain for Access Control and Trustiness of Resources in Cloud ComputingNetworked Digital Technologies10.1007/978-3-642-14292-5_37(358-368)Online publication date: 2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media