Visitor access control scheme utilizing social relationship in the real world

Gen Kitagata, Debasish Chakraborty, Satoshi Ogawa, Atushi Takeda, Kazuo Hashimoto, Norio Shiratori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.

Original languageEnglish
Title of host publicationTrust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Proceedings
EditorsMasakatsu Nishigaki, Audun Jøsang, Yuko Murayama, Stephen Marsh
PublisherSpringer New York LLC
Pages95-107
Number of pages13
ISBN (Print)9783642134456
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2010 - Morioka, Japan
Duration: 2010 Jun 162010 Jun 18

Publication series

NameIFIP Advances in Information and Communication Technology
Volume321
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Other

Other4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2010
Country/TerritoryJapan
CityMorioka
Period10/6/1610/6/18

Keywords

  • Access control
  • Collaborative work
  • Socialware
  • Symbiotic computing

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Visitor access control scheme utilizing social relationship in the real world'. Together they form a unique fingerprint.

Cite this