Skip to main content

Access Control Requirements for Physical Spaces Protected by Virtual Perimeters

  • Conference paper
  • First Online:
Trust, Privacy and Security in Digital Business (TrustBus 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11033))

Included in the following conference series:

Abstract

Intelligent computing capabilities are gradually being entrenched into physical spaces, thereby clouding the boundaries between physical and cyber spaces. To date, physically-enabled cyber-attacks have not fully been addressed in cyber space, due to a limitation on available technology. When a sensitive spreadsheet is printed, it leaves the protection of the logical space, and is only protected by security mechanisms of the physical space in which it is located. To provide better protection, a virtual perimeter can be formed around such a document, using location and topology-aware technologies. Making security mechanisms more location and topology-aware requires the investigation of a range of security relevant characteristics and their possible representations. To date, not much research has been done to address the protection of assets within a virtual perimeter. This research makes a contribution by evaluating a number of current access control approaches that address the physical and cyber world together, and then proposes a set of access control requirements for physical spaces that are protected by virtual perimeters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Plank, H., Steinbaeck, J., Druml, N., Steger, C., Holweg, G.: Localization and context determination for cyber-physical systems based on 3D imaging (Chap. 1). In: Solutions for Cyber-Physical Systems Ubiquity, pp. 1–26. IGI-Global (2018)

    Google Scholar 

  2. Alarifi, A., et al.: Ultra wideband indoor positioning technologies: analysis and recent advances. Sensors 16(5), 707 (2016)

    Article  Google Scholar 

  3. Tsigkanos, C., Pasquale, L., Ghezzi, C., Nuseibeh, B.: On the interplay between cyber and physical spaces for adaptive security. IEEE Trans. Depend. Secur. Comput. 15(3), 466–480 (2016)

    Article  Google Scholar 

  4. Gao, C., Yu, Z., Wei, Y., Russell, S., Guan, Y.: A statistical indoor localization method for supporting location-based access control. Mob. Netw. Appl. 14(2), 253–263 (2009)

    Article  Google Scholar 

  5. Marakkannu, S.P., Sivakumar, B.B., Joseph, V., Honeywell International Inc.: Physical and logical threat analysis in access control systems using BIM. U.S. Patent 9,799,208 (2017)

    Google Scholar 

  6. Jensen, C.D., Geneser, K., Willemoes-Wissing, I.C.: Sensor enhanced access control: extending traditional access control models with context-awareness. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IAICT, vol. 401, pp. 177–192. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38323-6_13

    Chapter  Google Scholar 

  7. Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)

    Article  Google Scholar 

  8. Matyáš, V., Říha, Z.: Biometric authentication—security and usability. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 227–239. Springer, Boston, MA (2002). https://doi.org/10.1007/978-0-387-35612-9_17

    Chapter  Google Scholar 

  9. Sandhu, R., Samarati, P.: Authentication, access control, and audit. ACM Comput. Surv. (CSUR) 28(1), 241–243 (1996)

    Article  Google Scholar 

  10. Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)

    Article  Google Scholar 

  11. Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-physical Systems Security, vol. 5, July 2009

    Google Scholar 

  12. Cerullo, G., Coppolino, L., D’Antonio, S., Formicola, V., Papale, G., Ragucci, B.: Enabling convergence of physical and logical security through intelligent event correlation. In: Novais, P., Camacho, D., Analide, C., El Fallah Seghrouchni, A., Badica, C. (eds.) Intelligent Distributed Computing IX. SCI, vol. 616, pp. 427–437. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-25017-5_40

    Chapter  Google Scholar 

  13. Rainham, D., McDowell, I., Krewski, D., Sawada, M.: Conceptualizing the healthscape: contributions of time geography, location technologies and spatial ecology to place and health research. Soc. Sci. Med. 70(5), 668–676 (2010)

    Article  Google Scholar 

  14. Fallah, N., Apostolopoulos, I., Bekris, K., Folmer, E.: Indoor human navigation systems: a survey. Interact. Comput. 25, 21–33 (2013)

    Google Scholar 

  15. Duque Domingo, J., Cerrada, C., Valero, E., Cerrada, J.: Indoor positioning system using depth maps and wireless networks. J. Sens. 2016, 8 (2016)

    Article  Google Scholar 

  16. Duque Domingo, J., Cerrada, C., Valero, E., Cerrada, J.A.: An improved indoor positioning system using RGB-D cameras and wireless networks for use in complex environments. Sensors 17(10), 2391 (2017)

    Article  Google Scholar 

  17. Mautz, R., Tilch, S.: Survey of optical indoor positioning systems. In: Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal, 21–23 September 2011, pp. 1–7 (2011)

    Google Scholar 

  18. Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: EASE, vol. 8, pp. 68–77, June 2008

    Google Scholar 

  19. Skandhakumar, N., Reid, J., Dawson, E., Drogemuller, R., Salim, F.: An authorization framework using building information models. Comput. J. 55(10), 1244–1264 (2012)

    Article  Google Scholar 

  20. Pasquale, L., et al.: Topology-aware access control of smart spaces. Computer 50(7), 54–63 (2017)

    Article  Google Scholar 

  21. Hernández, J.L., Moreno, M.V., Jara, A.J., Skarmeta, A.F.: A soft computing based location-aware access control for smart buildings. Soft. Comput. 18(9), 1659–1674 (2014)

    Article  Google Scholar 

  22. Satoh, I.: Spatial connector: mapping access control models for pervasive computing and cloud computing. Procedia Comput. Sci. 110, 174–181 (2017)

    Article  Google Scholar 

  23. Gu, N., Singh, V., Taylor, C., London, K., Brankovic, L.: BIM adoption: expectations across disciplines. In: Handbook of Research on Building Information Modeling and Construction Informatics: Concepts and Technologies, pp. 501–520. IGI Global (2010)

    Google Scholar 

  24. ISO 16739:2013. https://www.iso.org/standard/51622.html

  25. OASIS XACML Technical Committee. eXtensible access control markup language (XACML) Version 3.0. Oasis Standard, OASIS (2013)

    Google Scholar 

  26. Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 236–241. IEEE, August 2011

    Google Scholar 

  27. Hernández-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. (JISIS) 3(3/4), 1–16 (2013)

    Google Scholar 

  28. Elliott Bell, D.: Bell–La Padula model. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 74–79. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_811

    Chapter  Google Scholar 

  29. Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)

    Article  Google Scholar 

  30. Kim, Y.J., Kang, H.Y., Lee, J.: Development of indoor spatial data model using CityGML ADE. ISPRS-Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 1(2), 41–45 (2013)

    Article  Google Scholar 

  31. Namiot, D., Sneps-Sneppe, M.: Geofence and network proximity. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2013. LNCS, vol. 8121, pp. 117–127. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40316-3_11

    Chapter  Google Scholar 

  32. Young-Hyun, E., Young-Keun, C., Cho, S., Jeon, B.: FloGeo: a floatable three-dimensional geofence with mobility for the internet of things. J. Adv. Res. Dyn. Control Syst. 08-Special Issue, 114–120 (2017)

    Google Scholar 

  33. Rajpoot, Q.M., Jensen, C.D.: Video surveillance: privacy issues and legal compliance. In: Promoting Social Change and Democracy Through Information Technology, p. 69 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marijke Coetzee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Greaves, B., Coetzee, M., Leung, W.S. (2018). Access Control Requirements for Physical Spaces Protected by Virtual Perimeters. In: Furnell, S., Mouratidis, H., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science(), vol 11033. Springer, Cham. https://doi.org/10.1007/978-3-319-98385-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98385-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98384-4

  • Online ISBN: 978-3-319-98385-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics