{"id":"https://openalex.org/W1997842357","doi":"https://doi.org/10.1145/1368310.1368341","title":"On spatio-temporal constraints and inheritance in role-based access control","display_name":"On spatio-temporal constraints and inheritance in role-based access control","publication_year":2008,"publication_date":"2008-03-18","ids":{"openalex":"https://openalex.org/W1997842357","doi":"https://doi.org/10.1145/1368310.1368341","mag":"1997842357"},"language":"en","primary_location":{"id":"doi:10.1145/1368310.1368341","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1368310.1368341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100711695","display_name":"Liang Chen","orcid":"https://orcid.org/0000-0002-7505-3129"},"institutions":[{"id":"https://openalex.org/I4210160447","display_name":"Universidad de Londres","ror":"https://ror.org/054v4yq51","country_code":"MX","type":"education","lineage":["https://openalex.org/I4210160447"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"Liang Chen","raw_affiliation_strings":["University of London"],"affiliations":[{"raw_affiliation_string":"University of London","institution_ids":["https://openalex.org/I4210160447"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109050799","display_name":"Jason Crampton","orcid":"https://orcid.org/0000-0003-2151-8426"},"institutions":[{"id":"https://openalex.org/I4210160447","display_name":"Universidad de Londres","ror":"https://ror.org/054v4yq51","country_code":"MX","type":"education","lineage":["https://openalex.org/I4210160447"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Jason Crampton","raw_affiliation_strings":["University of London"],"affiliations":[{"raw_affiliation_string":"University of London","institution_ids":["https://openalex.org/I4210160447"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100711695"],"corresponding_institution_ids":["https://openalex.org/I4210160447"],"apc_list":null,"apc_paid":null,"fwci":11.9677,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.97941889,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"205","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9674999713897705,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.8850736021995544},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8173530101776123},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7440144419670105},{"id":"https://openalex.org/keywords/temporal-database","display_name":"Temporal database","score":0.5833637714385986},{"id":"https://openalex.org/keywords/inheritance","display_name":"Inheritance (genetic algorithm)","score":0.5643718838691711},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5205720067024231},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.46697258949279785},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4565150737762451},{"id":"https://openalex.org/keywords/temporal-logic","display_name":"Temporal logic","score":0.43666544556617737},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.41651663184165955},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4037160873413086},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3149552345275879},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2834136486053467},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20790299773216248},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16866642236709595}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.8850736021995544},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8173530101776123},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7440144419670105},{"id":"https://openalex.org/C77277458","wikidata":"https://www.wikidata.org/wiki/Q1969246","display_name":"Temporal database","level":2,"score":0.5833637714385986},{"id":"https://openalex.org/C2780902518","wikidata":"https://www.wikidata.org/wiki/Q6033780","display_name":"Inheritance (genetic algorithm)","level":3,"score":0.5643718838691711},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5205720067024231},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.46697258949279785},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4565150737762451},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.43666544556617737},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.41651663184165955},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4037160873413086},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3149552345275879},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2834136486053467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20790299773216248},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16866642236709595},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1368310.1368341","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1368310.1368341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.141.3390","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.3390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.isg.rhul.ac.uk/~jason/Pubs/asiaccs08.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.216.7085","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.7085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.isg.rhul.ac.uk/~pqah018/pubs/asiaccs08.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1553052391","https://openalex.org/W1998208223","https://openalex.org/W2007774531","https://openalex.org/W2037716001","https://openalex.org/W2063838657","https://openalex.org/W2076004681","https://openalex.org/W2078590050","https://openalex.org/W2092064278","https://openalex.org/W2125942055","https://openalex.org/W2141696417","https://openalex.org/W2148575440","https://openalex.org/W2156245716","https://openalex.org/W2163288278","https://openalex.org/W2164396200","https://openalex.org/W2166602595"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W819284483","https://openalex.org/W1848392865"],"abstract_inverted_index":{"Pervasive":[0],"computing":[1],"environments":[2],"have":[3,24],"created":[4],"a":[5,27],"requirement":[6],"for":[7,66],"spatial-":[8],"and":[9,17,32,43,68,75,92,124,128],"temporal-aware":[10],"access":[11,20,151],"control":[12,21],"systems.":[13],"Although":[14],"temporal,":[15],"spatial":[16],"spatio-temporal":[18,41,57,97,113,120,144],"role-based":[19],"(RBAC)":[22],"models":[23,34,58,71,79,121],"been":[25],"developed,":[26],"family":[28],"of":[29,103],"simple,":[30],"expressive":[31],"flexible":[33],"that":[35,118,149],"convincingly":[36],"addresses":[37],"the":[38,62,86,101,129],"interaction":[39],"between":[40],"constraints":[42],"inheritance":[44],"in":[45,85,132,146],"RBAC":[46,90],"does":[47],"not":[48],"yet":[49],"exist.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54,138],"define":[55],"three":[56],"based":[59],"on":[60],"RBAC96":[61,127],"de":[63],"facto":[64],"standard":[65],"RBAC,":[67],"extend":[69],"these":[70],"to":[72,88,109,134,142,153],"include":[73],"activation":[74],"usage":[76],"hierarchies.":[77],"These":[78],"provide":[80],"different":[81],"authorization":[82],"semantics,":[83],"varying":[84],"extent":[87],"which":[89,106],"entities":[91],"relations":[93],"are":[94,107,122],"constrained":[95],"by":[96],"restrictions.":[98,114],"We":[99,115],"introduce":[100],"notion":[102],"trusted":[104],"entities,":[105],"used":[108],"selectively":[110],"override":[111],"certain":[112],"also":[116],"demonstrate":[117],"our":[119],"consistent":[123],"compatible":[125],"with":[126],"ANSI-RBAC":[130],"standard,":[131],"contrast":[133],"existing":[135],"models.":[136],"Finally,":[137],"propose":[139],"four":[140],"approaches":[141],"encoding":[143],"requirements":[145],"practical":[147],"applications":[148],"permit":[150],"requests":[152],"be":[154],"answered":[155],"efficiently.":[156]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
