Reference Hub3
Modelling of Location-Aware Access Control Rules

Modelling of Location-Aware Access Control Rules

Michael Decker
ISBN13: 9781609600426|ISBN10: 1609600428|EISBN13: 9781609600433
DOI: 10.4018/978-1-60960-042-6.ch057
Cite Chapter Cite Chapter

MLA

Decker, Michael. "Modelling of Location-Aware Access Control Rules." Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, edited by Maria Manuela Cruz-Cunha and Fernando Moreira, IGI Global, 2011, pp. 912-929. https://doi.org/10.4018/978-1-60960-042-6.ch057

APA

Decker, M. (2011). Modelling of Location-Aware Access Control Rules. In M. Cruz-Cunha & F. Moreira (Eds.), Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts (pp. 912-929). IGI Global. https://doi.org/10.4018/978-1-60960-042-6.ch057

Chicago

Decker, Michael. "Modelling of Location-Aware Access Control Rules." In Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, edited by Maria Manuela Cruz-Cunha and Fernando Moreira, 912-929. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-042-6.ch057

Export Reference

Mendeley
Favorite

Abstract

Access control in the domain of information system security refers to the process of deciding whether a particular request made by a user to perform a particular operation on a particular object under the control of the system should be allowed or denied. For example, the access control component of a file server might have to decide whether user “Alice” is allowed to perform the operation “delete” on the object “document.txt”. For traditional access control this decision is based on the evaluation of the identity of the user and attributes of the object. The novel idea of location-aware access control is also to consider the user’s current location which is determined by a location system like GPS. The main purpose of this article is to present several approaches for the modeling of location-aware access control rules. We consider generic as well as application-specific access control models that can be found in literature.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.