Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC can be used to implement location dependent a...
The paper first discusses motivations why taking into account location information in authentication...
Several models for incorporating spatial constraints into role-based access control (RBAC) have been...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wi...
Data security in a mobile context is a critical issue. Over the last few years a new category of loc...
The topic addressed in this thesis concerns the relationship between spatial knowledge and informati...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
In the last few years there has been an increasing interest for a novel category of access control m...
Securing access to data in location-based services and mobile applications requires the definition o...
As mobile computing devices are becoming increasingly dominant in enterprise and government organiza...
Securing access to data in location-based services and mobile applications requires the definition o...
Securing access to data in location-based services and mobile applications requires the definition o...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
Abstract—The paper first discusses motivations why taking into account location information in authe...
Access control has been applied in various scenarios in the past for negotiating the best policy. So...
The paper first discusses motivations why taking into account location information in authentication...
Several models for incorporating spatial constraints into role-based access control (RBAC) have been...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wi...
Data security in a mobile context is a critical issue. Over the last few years a new category of loc...
The topic addressed in this thesis concerns the relationship between spatial knowledge and informati...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
In the last few years there has been an increasing interest for a novel category of access control m...
Securing access to data in location-based services and mobile applications requires the definition o...
As mobile computing devices are becoming increasingly dominant in enterprise and government organiza...
Securing access to data in location-based services and mobile applications requires the definition o...
Securing access to data in location-based services and mobile applications requires the definition o...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
Abstract—The paper first discusses motivations why taking into account location information in authe...
Access control has been applied in various scenarios in the past for negotiating the best policy. So...
The paper first discusses motivations why taking into account location information in authentication...
Several models for incorporating spatial constraints into role-based access control (RBAC) have been...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wi...