2007
DOI: 10.1016/j.future.2006.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated access control with temporal and spatial constraints on mobile execution in coalition environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 39 publications
(27 reference statements)
0
3
0
Order By: Relevance
“…Some control models are put forward, such as Access Control Lists (ACLs) [3], Access Control Matrixes (ACM) [4], Discretionary Access Control (DAC) model [3], Role-Based Access Control (RBAC) model [5], Task-Based Access Control (TBAC) model [6], Task-Role-Based Access Control (TRBAC) model [4]. Although these models have been widely discussed and applied in various fields [7][8][9][10], detailed discussion is needed in order to provide an effective access control mechanism for manufacturing process in networked manufacturing environment.…”
Section: Introductionmentioning
confidence: 99%
“…Some control models are put forward, such as Access Control Lists (ACLs) [3], Access Control Matrixes (ACM) [4], Discretionary Access Control (DAC) model [3], Role-Based Access Control (RBAC) model [5], Task-Based Access Control (TBAC) model [6], Task-Role-Based Access Control (TRBAC) model [4]. Although these models have been widely discussed and applied in various fields [7][8][9][10], detailed discussion is needed in order to provide an effective access control mechanism for manufacturing process in networked manufacturing environment.…”
Section: Introductionmentioning
confidence: 99%
“…The GEO-RBAC model allows a user to activate a role from a particular location, and the role and its permissions are predefined for that location. Other models considering both location and time constraints have been proposed, see for example [12], [11], [22], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Such problems have been nevertheless widely acknowledged and extensively studied [57,[70][71][72]. Another line of the future work is therefore to incorporate proper security mechanisms into the execution model of m-JGRIM, and also to investigate how these mechanisms can be integrated with existing security standards for the Grid such as GSI † † and eventually approaches especially designed to support secure code mobility in Grid settings, for which concrete advances already exist [73,74].…”
mentioning
confidence: 99%