{"id":"https://openalex.org/W2033068126","doi":"https://doi.org/10.1109/jsyst.2013.2242751","title":"Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model","display_name":"Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model","publication_year":2013,"publication_date":"2013-07-04","ids":{"openalex":"https://openalex.org/W2033068126","doi":"https://doi.org/10.1109/jsyst.2013.2242751","mag":"2033068126"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2013.2242751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2013.2242751","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022445851","display_name":"Ramadan Abdunabi","orcid":"https://orcid.org/0000-0002-2623-3473"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ramadan Abdunabi","raw_affiliation_strings":["Computer Science Department, Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067442300","display_name":"Mustafa Al-Lail","orcid":null},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mustafa Al-Lail","raw_affiliation_strings":["Computer Science Department, Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008904412","display_name":"Indrakshi Ray","orcid":"https://orcid.org/0000-0002-0714-7676"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrakshi Ray","raw_affiliation_strings":["Computer Science Department, Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107830637","display_name":"Robert B. France","orcid":null},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert B. France","raw_affiliation_strings":["Computer Science Department, Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022445851"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":15.6031,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.98649586,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"7","issue":"3","first_page":"501","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8031653165817261},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6886447072029114},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.6010997295379639},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4513201415538788},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4367062747478485},{"id":"https://openalex.org/keywords/object-constraint-language","display_name":"Object Constraint Language","score":0.41907089948654175},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.33312833309173584},{"id":"https://openalex.org/keywords/applications-of-uml","display_name":"Applications of UML","score":0.2769375443458557},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23420047760009766},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22030282020568848},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09866181015968323}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8031653165817261},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6886447072029114},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.6010997295379639},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4513201415538788},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4367062747478485},{"id":"https://openalex.org/C133264317","wikidata":"https://www.wikidata.org/wiki/Q1397689","display_name":"Object Constraint Language","level":5,"score":0.41907089948654175},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.33312833309173584},{"id":"https://openalex.org/C41298492","wikidata":"https://www.wikidata.org/wiki/Q4781506","display_name":"Applications of UML","level":4,"score":0.2769375443458557},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23420047760009766},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22030282020568848},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09866181015968323}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2013.2242751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2013.2242751","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1540492331","https://openalex.org/W1553052391","https://openalex.org/W1568423508","https://openalex.org/W1606971372","https://openalex.org/W1628797000","https://openalex.org/W1875062215","https://openalex.org/W1875930898","https://openalex.org/W1971584003","https://openalex.org/W2021079739","https://openalex.org/W2041232096","https://openalex.org/W2060440626","https://openalex.org/W2063997960","https://openalex.org/W2076004681","https://openalex.org/W2101508170","https://openalex.org/W2111445678","https://openalex.org/W2138561498","https://openalex.org/W2141696417","https://openalex.org/W2142168582","https://openalex.org/W2142340571","https://openalex.org/W2149593869","https://openalex.org/W2151430568","https://openalex.org/W2155030920","https://openalex.org/W2156245716","https://openalex.org/W2166602595","https://openalex.org/W2171348712","https://openalex.org/W4234462886","https://openalex.org/W4300766447","https://openalex.org/W6607957506","https://openalex.org/W6680569093"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"With":[0],"the":[1,18,42,45,50,60,101,107,113,120,138,148,191],"advent":[2],"of":[3,17,21,44,54,153,186,193],"wireless":[4],"and":[5,47,52,106,164,176],"mobile":[6],"devices,":[7],"many":[8],"new":[9],"applications":[10,29],"are":[11,112],"being":[12],"developed":[13],"that":[14,84,90,111,127,168],"make":[15],"use":[16],"spatio-temporal":[19,72,149],"information":[20],"a":[22,38,166,184],"user":[23,46],"to":[24,37,70,87,146,189],"provide":[25,71,165],"better":[26],"functionality.":[27],"Such":[28],"also":[30,48,182],"necessitate":[31],"sophisticated":[32],"authorization":[33],"models":[34,79],"where":[35],"access":[36,62,68,73,150,171],"resource":[39],"depends":[40],"on":[41,49],"credentials":[43],"location":[51],"time":[53],"access.":[55],"Consequently,":[56],"researchers":[57],"have":[58],"extended":[59],"traditional":[61],"control":[63,151,172],"models,":[64],"such":[65],"as":[66],"role-based":[67],"control,":[69],"control.":[74],"We":[75,96,156,181],"improve":[76],"upon":[77],"these":[78],"by":[80,119],"providing":[81],"additional":[82],"features":[83,126],"allow":[85],"us":[86],"express":[88,97],"constraints":[89],"were":[91],"not":[92],"possible":[93],"until":[94],"now.":[95],"our":[98,162,179,194],"model":[99,123,152,163],"using":[100],"unified":[102],"modeling":[103],"language":[104,110],"(UML)":[105],"object":[108],"constraint":[109],"de":[114],"facto":[115],"specification":[116,140],"languages":[117],"used":[118,145],"industry.":[121],"Our":[122],"has":[124],"numerous":[125],"interact":[128],"in":[129,178],"subtle":[130],"ways.":[131],"To":[132],"this":[133,187],"end,":[134],"we":[135],"show":[136],"how":[137,170],"UML-based":[139],"environment":[141],"tool":[142],"can":[143,173],"be":[144,174],"analyze":[147],"an":[154,158],"application.":[155],"propose":[157],"architecture":[159,188],"for":[160],"enforcing":[161],"protocol":[167],"demonstrates":[169],"granted":[175],"revoked":[177],"approach.":[180,195],"develop":[183],"prototype":[185],"demonstrate":[190],"feasibility":[192]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
