[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1667502.1667508acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Towards location-based access control in healthcare emergency response

Published: 03 November 2009 Publication History

Abstract

Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points.

References

[1]
S. Aich, S. Mondal, S. Sural, and A. K. Majumdar. Role based access control with spatiotemporal context for mobile applications. Transactions on Computational Science IV: Special Issue on Security in Computing, pages 177--199, 2009.
[2]
S. Aich, S. Sural, and A. K. Majumdar. Starbac: Spatio temporal role based access control. In OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, pages 1567--1582. Springer, 2007.
[3]
C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. Access control in location-based services. In C. Bettini, S. Jajodia, P. Samarati, and S. Wang, editors, Privacy in Location Based Applications. Springer, 2009.
[4]
W.-S. Ku, R. Zimmermann, H. Wang, and C.-N. Wan. Adaptive nearest neighbor queries in travel time networks. In GIS '05: Proceedings of the 13th annual ACM international workshop on Geographic information systems, pages 210--219, New York, NY, USA, 2005. ACM.
[5]
M. Kumar and R. E. Newman. Strbac - an approach towards spatio-temporal role-based access control. In Communication, Network, and Information Security, pages 150--155, 2006.
[6]
K. Mouratidis, M. L. Yiu, D. Papadias, and N. Mamoulis. Continuous nearest neighbor monitoring in road networks. In VLDB '06: Proceedings of the 32nd international conference on Very large data bases, pages 43--54. VLDB Endowment, 2006.
[7]
D. Papadias, J. Zhang, N. Mamoulis, and Y. Tao. Query processing in spatial network databases. In VLDB '2003: Proceedings of the 29th international conference on Very large data bases, pages 802--813. VLDB Endowment, 2003.

Cited By

View all
  • (2018)Efficiently enforcing spatiotemporal access control under uncertain location informationJournal of Computer Security10.5555/2011016.201102319:3(607-637)Online publication date: 24-Dec-2018
  • (2013)DaisyACM SIGMOD Record10.1145/2430456.243046741:4(39-44)Online publication date: 17-Jan-2013
  • (2012)On Location-Based Services for Patient Empowerment, Guidance and SafetyWireless Mobile Communication and Healthcare10.1007/978-3-642-29734-2_58(416-422)Online publication date: 2012

Index Terms

  1. Towards location-based access control in healthcare emergency response

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SPRINGL '09: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
        November 2009
        79 pages
        ISBN:9781605588537
        DOI:10.1145/1667502
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 03 November 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        GIS '09
        Sponsor:

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 12 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2018)Efficiently enforcing spatiotemporal access control under uncertain location informationJournal of Computer Security10.5555/2011016.201102319:3(607-637)Online publication date: 24-Dec-2018
        • (2013)DaisyACM SIGMOD Record10.1145/2430456.243046741:4(39-44)Online publication date: 17-Jan-2013
        • (2012)On Location-Based Services for Patient Empowerment, Guidance and SafetyWireless Mobile Communication and Healthcare10.1007/978-3-642-29734-2_58(416-422)Online publication date: 2012

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media