2011 IEEE Symposium on Computers and Communications (ISCC) 2011
DOI: 10.1109/iscc.2011.5983932
|View full text |Cite
|
Sign up to set email alerts
|

Spatio temporal emergency role based access control (STEM-RBAC): A time and location aware role based access control model with a break the glass mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…RBAC allows users to access information related to the specific roles that they have been assigned. In real-life settings, RBAC may not be appropriate because of conflicts that may occur between roles [2][3][4][5]. The characteristics, merits, and demerits of access control techniques are set forth in Table 1.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…RBAC allows users to access information related to the specific roles that they have been assigned. In real-life settings, RBAC may not be appropriate because of conflicts that may occur between roles [2][3][4][5]. The characteristics, merits, and demerits of access control techniques are set forth in Table 1.…”
Section: Related Workmentioning
confidence: 99%
“…General wireless security threats that may occur in business and social life using mobile devices include rogue evil twin APs, ad hoc networks, RF jamming, deauthentication, MAC spoofing, WEP key cracking, and sniffing [1,2]. Table 2 classifies wireless security threats with respect to confidentiality, integrity, and availability (three elements of security) that may occur in business and social life using mobile devices.…”
Section: Threats In Wireless Securitymentioning
confidence: 99%
See 3 more Smart Citations