Inproceedings3095
LocationAware Discretionary Access Control based on the Unix Permission Bits Model
LocationAware Discretionary Access Control based on the Unix Permission Bits Model
Published: 2010
Herausgeber: Alexander Zipf, Sandra Lanig, Michael Bauer
Buchtitel: 6. GI/ITG KuVS Fachgespräch "Ortsbezogene Anwendungen und Dienste" (2009)
Nummer: Heft 18Der Datenwert „Heft“ kann einem Attribut des Datentyps Zahl nicht zugeordnet werden sondern bspw. der Datenwert „18“.
Reihe: Heidelberger Geographische Bausteine
Seiten: 21-30
Verlag: Geographisches Institut der Universität Heidelberg
Erscheinungsort: Heidelberg
Organisation: GI/ITG
Nicht-referierte Veröffentlichung
BibTeX
Kurzfassung
The basic idea behind location‐aware access control is to evaluate a mobile user’s current location for the decision
if he is allowed to perform a particular operation on a particular resource (e.g., electronic document, database
object) or not. For example, a company could want to forbid access to all confidential data for users who currently
stay outside the home country of that company. In literature some access control models, that are locationaware,
can be found; however, almost all of them are based on “Role‐Based Access Control” (RBAC). In the
article at hand we therefore propose a location‐aware access control models that is an instant of “Discretionary
Access Control” (DAC). This model is obtained by assigning location‐constraints to the well‐known permission
bits model implemented by Unix‐like operating systems.
Betriebliche Informationssysteme