Temporal Location-Aware Access Control Model By Yu, Lijun lijun@cs.colostate.edu
Location-based access control model Significance of using location as a means of authentication & authorization Military, Location aware computing Technologically possible to track user and object location at a acceptable precision GPS, RF-ID Location-based Services A series of related work by Denning, Leonhardt. et al, etc.
Location-based access control model Location is modeled as a set of points Location constraints on User assignment Permission assignment Role activation Permission (object location) Users have dynamic access control at different user location and object location
Temporal RBAC model Express wide range of temporal constraints User assignment Permission assignment Role activation Role enabling Constraints Temporal constraints can be Duration constraints Periodic constraints
Temporal RBAC model Run-time requests Trigger User-Role activation Role enabling/activation/assignment Trigger Conflicts and conflict resolution Execution model
Motivation A boss agrees with the employees that he can track employees’ location only during office hours, i.e. 9AM – 5PM, M-F Bob paid twenty dollars per month for roadside assistant service so that he can use that service for up to thirty hours per week Solution: A combined temporal and location based RBAC model
How Based on the notations defined in TRBAC and GTRBAC Location-based event expressions Location-based role triggers Location and temporal constraints conflicts More work on the event model