By Topic

Spatio temporal emergency role based access control (STEM-RBAC): A time and location aware role based access control model with a break the glass mechanism

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Georgakakis, E. ; Dept. of Inf., Univ. of Piraeus, Piraeus, Greece ; Nikolidakis, S.A. ; Vergados, D.D. ; Douligeris, C.

The ever-increasing use of information systems and networks in every aspect of our lives has made possible the transfer of data to a wide range of different users and applications. In recent years, several architectures and models have been proposed in order to limit access to resources and ensure that data are available only to authorized users, programs or processes. These models in most cases are not dynamic and the permissions assigned to users are granted based on a static policy. A mechanism that will allow exception access to data, for example to medical information, in case of an emergency is needed. In current systems, emergency access techniques are not well defined and are used in an ad hoc manner on top of the access control mechanisms implemented without using parameters such as time, location or hierarchy of the actors involved in the system. In this paper, we present a model that provides both a normal access control based on roles and also a mechanism that is used in order to provide exception access to data in case of an emergency. The proposed emergency access mechanism is time aware and takes into account the mobility and location of users, also it grants exception access with a controlled manner in case of an emergency utilizing role hierarchies.

Published in:

Computers and Communications (ISCC), 2011 IEEE Symposium on

Date of Conference:

June 28 2011-July 1 2011