Aus Aifbportal
Version vom 17. September 2010, 12:03 Uhr von Mde (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Decker |ErsterAutorVorname=Michael }} {{Inproceedings |Referiert=False |Title=LocationAware Discretionary Access C…“)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)
Wechseln zu:Navigation, Suche

LocationAware Discretionary Access Control based on the Unix Permission Bits Model

LocationAware Discretionary Access Control based on the Unix Permission Bits Model

Published: 2010
Herausgeber: Alexander Zipf, Sandra Lanig, Michael Bauer
Buchtitel: 6. GI/ITG KuVS Fachgespräch "Ortsbezogene Anwendungen und Dienste" (2009)
Nummer: Heft 18Der Datenwert „Heft“ kann einem Attribut des Datentyps Zahl nicht zugeordnet werden sondern bspw. der Datenwert „18“.
Reihe: Heidelberger Geographische Bausteine
Seiten: 21-30
Verlag: Geographisches Institut der Universität Heidelberg
Erscheinungsort: Heidelberg
Organisation: GI/ITG

Nicht-referierte Veröffentlichung


The basic idea behind location‐aware access control is to evaluate a mobile user’s current location for the decision if he is allowed to perform a particular operation on a particular resource (e.g., electronic document, database object) or not. For example, a company could want to forbid access to all confidential data for users who currently stay outside the home country of that company. In literature some access control models, that are locationaware, can be found; however, almost all of them are based on “Role‐Based Access Control” (RBAC). In the article at hand we therefore propose a location‐aware access control models that is an instant of “Discretionary Access Control” (DAC). This model is obtained by assigning location‐constraints to the well‐known permission bits model implemented by Unix‐like operating systems.




Betriebliche Informationssysteme


Mobile Technologien