Download presentation
Presentation is loading. Please wait.
Published byΞανθίππη Παπαφιλίππου Modified over 6 years ago
1
Temporal Location-Aware Access Control Model
By Yu, Lijun
2
Location-based access control model
Significance of using location as a means of authentication & authorization Military, Location aware computing Technologically possible to track user and object location at a acceptable precision GPS, RF-ID Location-based Services A series of related work by Denning, Leonhardt. et al, etc.
3
Location-based access control model
Location is modeled as a set of points Location constraints on User assignment Permission assignment Role activation Permission (object location) Users have dynamic access control at different user location and object location
4
Temporal RBAC model Express wide range of temporal constraints
User assignment Permission assignment Role activation Role enabling Constraints Temporal constraints can be Duration constraints Periodic constraints
5
Temporal RBAC model Run-time requests Trigger
User-Role activation Role enabling/activation/assignment Trigger Conflicts and conflict resolution Execution model
6
Motivation A boss agrees with the employees that he can track employees’ location only during office hours, i.e. 9AM – 5PM, M-F Bob paid twenty dollars per month for roadside assistant service so that he can use that service for up to thirty hours per week Solution: A combined temporal and location based RBAC model
7
How Based on the notations defined in TRBAC and GTRBAC
Location-based event expressions Location-based role triggers Location and temporal constraints conflicts More work on the event model
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.