By Topic

Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Abdunabi, R. ; Comput. Sci. Dept., Colorado State Univ., Fort Collins, CO, USA ; Al-Lail, M. ; Ray, I. ; France, R.B.

With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user to provide better functionality. Such applications also necessitate sophisticated authorization models where access to a resource depends on the credentials of the user and also on the location and time of access. Consequently, researchers have extended the traditional access control models, such as role-based access control, to provide spatio-temporal access control. We improve upon these models by providing additional features that allow us to express constraints that were not possible until now. We express our model using the unified modeling language (UML) and the object constraint language that are the de facto specification languages used by the industry. Our model has numerous features that interact in subtle ways. To this end, we show how the UML-based specification environment tool can be used to analyze the spatiotemporal access control model of an application. We propose an architecture for enforcing our model and provide a protocol that demonstrates how access control can be granted and revoked in our approach. We also develop a prototype of this architecture to demonstrate the feasibility of our approach.

Published in:

Systems Journal, IEEE  (Volume:7 ,  Issue: 3 )