Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Topology-Aware Access Control of Smart Spaces

Published: 01 January 2017 Publication History

Abstract

Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization tool allows security analysts to edit space topology and verify that access-control policies meet security requirements.

References

[1]
H.-T. Chen, S.-W. Wu, and S.-H. Hsieh, “Visualization of CCTV Coverage in Public Building Space Using BIM Technology,” Visualization in Eng., vol. 1, no. 1, 2013, pp. 1–17.
[2]
M. Rafiee, “Improving Indoor Security Surveillance by Fusing Data from BIM, UWB and Video,” master's thesis, Concordia Univ., 2014.
[3]
N. Skandhakumar, “Integrated Access Control for Smart Buildings Using Building Information Models,” PhD dissertation, Queensland Univ. of Technology, 2014.
[4]
OASIS Std. eXtensible Access Control Markup Language (XACML) Version 3.0, 2013; oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.
[5]
S. Porter et al., “Breaking into BIM: Performing Static and Dynamic Security Analysis with the Aid of BIM,” Automation in Construction, vol. 40, 2014, pp. 84–95.
[6]
C. Tsigkanos et al., “Adding Static and Dynamic Semantics to Building Information Models,” in Proc. 2nd Int'l Workshop Software Eng. for Smart Cyber-Physical Systems (SEsCPS 16), 2016, pp. 1–7.
[7]
H. Hu, G.-J. Ahn, and K. Kulkarni, “Anomaly Discovery and Resolution in Web Access Control Policies,” in Proc. 16th ACM Symp. Access Control Models and Technologies (SACMAT 11), 2011, pp. 165–174.
[8]
G. Hughes and T. Bultan, “Automated Verification of Access Control Policies Using a SAT Solver,” Int'l J. Software Tools for Technology Transfer, vol. 10, no. 6, 2008, pp. 503–520.
[9]
W.M. Fitzgerald et al., “Anomaly Analysis for Physical Access Control Security Configuration,” in Proc. 7th IEEE Int'l Conf. Risk and Security of Internet and Systems (CRiSIS 12), 2012, pp. 1–8.

Cited By

View all
  • (2023)Achieve Your Goal Without Dying in the Attempt: Developing an Area-Based Support for Nomadic WorkHCI in Business, Government and Organizations10.1007/978-3-031-35969-9_28(421-438)Online publication date: 23-Jul-2023

Index Terms

  1. Topology-Aware Access Control of Smart Spaces
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Computer
            Computer  Volume 50, Issue 7
            2017
            93 pages

            Publisher

            IEEE Computer Society Press

            Washington, DC, United States

            Publication History

            Published: 01 January 2017

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 21 Sep 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2023)Achieve Your Goal Without Dying in the Attempt: Developing an Area-Based Support for Nomadic WorkHCI in Business, Government and Organizations10.1007/978-3-031-35969-9_28(421-438)Online publication date: 23-Jul-2023

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media