Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Location Spoofing

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
“Spoofing” in the domain of computer security means to fake one’s identity. In the context of LAAC “spoofing” means to manipulate a locating system. There are two basic cases: when an external spoofing attack is mounted then the adversary is not the possessor of the mobile device. In contrast to this an internal spoofing attack means that the possessor of the mobile device performs the attack.
Published in Chapter:
Modelling of Location-Aware Access Control Rules
Michael Decker (Karlsruhe Institute of Technology (KIT), Germany)
DOI: 10.4018/978-1-60960-042-6.ch057
Access control in the domain of information system security refers to the process of deciding whether a particular request made by a user to perform a particular operation on a particular object under the control of the system should be allowed or denied. For example, the access control component of a file server might have to decide whether user “Alice” is allowed to perform the operation “delete” on the object “document.txt”. For traditional access control this decision is based on the evaluation of the identity of the user and attributes of the object. The novel idea of location-aware access control is also to consider the user’s current location which is determined by a location system like GPS. The main purpose of this article is to present several approaches for the modeling of location-aware access control rules. We consider generic as well as application-specific access control models that can be found in literature.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR