The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government or-ganizations has led to considerable research in time- and location-based access control schemes. Location-based ac-cess policies enhance the security of an application by re-stricting access to an object only from specified locations. On the other hand, temporal constraints provide granular-ity in security features and also limit damage to an ap-plication to a specific time interval (e.g. when staff are present to respond if necessary). This paper introduces a novel approach to location- and time-based access control mechanism using Role-Based Access Control (RBAC). We believe that it is well-suited for organizations that require ...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
[[abstract]]Securing access to data, applied to mobile service applications with temporal and spati...
[[abstract]]Securing access to data in temporal and location-based services and mobile applications ...
Governmental and business organizations use the standard authorization model─ Role-based access cont...
Controlling access to resources in location-based services and mobile applications require the defin...
In location-based access control systems, the location of subjects is a relevant parameter in access...
In location-based access control systems, the location of subjects is a relevant parameter in access...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
In the last few years there has been an increasing interest for a novel category of access control m...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
In the last few years, a number of spatial and spatio-temporal access control models have been devel...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
[[abstract]]Securing access to data, applied to mobile service applications with temporal and spati...
[[abstract]]Securing access to data in temporal and location-based services and mobile applications ...
Governmental and business organizations use the standard authorization model─ Role-based access cont...
Controlling access to resources in location-based services and mobile applications require the defin...
In location-based access control systems, the location of subjects is a relevant parameter in access...
In location-based access control systems, the location of subjects is a relevant parameter in access...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
In the last few years there has been an increasing interest for a novel category of access control m...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
In the last few years, a number of spatial and spatio-temporal access control models have been devel...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
A key issue in computer system security is to protect information against unauthorized access. Emerg...