As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations. One technique that has been proposed is to augment role-based access control (RBAC) with spatial constraints. In such a system, an authorized user must be in a designated location in order to exercise the privileges associated with a role. In this work, we extend spatially aware RBAC systems by defining the notion of proximity-based r approach, access control decisions are not based solely on the requesti...
Generally, smart campus applications do not consider the role of the user with his/her position in a...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks ...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
Several models for incorporating spatial constraints into role-based access control (RBAC) have been...
In the last few years there has been an increasing interest for a novel category of access control m...
Data security in a mobile context is a critical issue. Over the last few years a new category of loc...
Securing access to data in location-based services and mobile applications requires the definition o...
Securing access to data in location-based services and mobile applications requires the definition o...
Published version of an article from the book: Security and privacy in mobile information and commun...
Securing access to data in location-based services and mobile applications requires the definition o...
The topic addressed in this thesis concerns the relationship between spatial knowledge and informati...
Controlling access to resources in location-based services and mobile applications require the defin...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
Generally, smart campus applications do not consider the role of the user with his/her position in a...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks ...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
Several models for incorporating spatial constraints into role-based access control (RBAC) have been...
In the last few years there has been an increasing interest for a novel category of access control m...
Data security in a mobile context is a critical issue. Over the last few years a new category of loc...
Securing access to data in location-based services and mobile applications requires the definition o...
Securing access to data in location-based services and mobile applications requires the definition o...
Published version of an article from the book: Security and privacy in mobile information and commun...
Securing access to data in location-based services and mobile applications requires the definition o...
The topic addressed in this thesis concerns the relationship between spatial knowledge and informati...
Controlling access to resources in location-based services and mobile applications require the defin...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
Generally, smart campus applications do not consider the role of the user with his/her position in a...
Recent advances in positioning and tracking technologies have led to the emergence of novel location...
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks ...