Abstract
Intelligent computing capabilities are gradually being entrenched into physical spaces, thereby clouding the boundaries between physical and cyber spaces. To date, physically-enabled cyber-attacks have not fully been addressed in cyber space, due to a limitation on available technology. When a sensitive spreadsheet is printed, it leaves the protection of the logical space, and is only protected by security mechanisms of the physical space in which it is located. To provide better protection, a virtual perimeter can be formed around such a document, using location and topology-aware technologies. Making security mechanisms more location and topology-aware requires the investigation of a range of security relevant characteristics and their possible representations. To date, not much research has been done to address the protection of assets within a virtual perimeter. This research makes a contribution by evaluating a number of current access control approaches that address the physical and cyber world together, and then proposes a set of access control requirements for physical spaces that are protected by virtual perimeters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Plank, H., Steinbaeck, J., Druml, N., Steger, C., Holweg, G.: Localization and context determination for cyber-physical systems based on 3D imaging (Chap. 1). In: Solutions for Cyber-Physical Systems Ubiquity, pp. 1–26. IGI-Global (2018)
Alarifi, A., et al.: Ultra wideband indoor positioning technologies: analysis and recent advances. Sensors 16(5), 707 (2016)
Tsigkanos, C., Pasquale, L., Ghezzi, C., Nuseibeh, B.: On the interplay between cyber and physical spaces for adaptive security. IEEE Trans. Depend. Secur. Comput. 15(3), 466–480 (2016)
Gao, C., Yu, Z., Wei, Y., Russell, S., Guan, Y.: A statistical indoor localization method for supporting location-based access control. Mob. Netw. Appl. 14(2), 253–263 (2009)
Marakkannu, S.P., Sivakumar, B.B., Joseph, V., Honeywell International Inc.: Physical and logical threat analysis in access control systems using BIM. U.S. Patent 9,799,208 (2017)
Jensen, C.D., Geneser, K., Willemoes-Wissing, I.C.: Sensor enhanced access control: extending traditional access control models with context-awareness. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IAICT, vol. 401, pp. 177–192. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38323-6_13
Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)
Matyáš, V., Říha, Z.: Biometric authentication—security and usability. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 227–239. Springer, Boston, MA (2002). https://doi.org/10.1007/978-0-387-35612-9_17
Sandhu, R., Samarati, P.: Authentication, access control, and audit. ACM Comput. Surv. (CSUR) 28(1), 241–243 (1996)
Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-physical Systems Security, vol. 5, July 2009
Cerullo, G., Coppolino, L., D’Antonio, S., Formicola, V., Papale, G., Ragucci, B.: Enabling convergence of physical and logical security through intelligent event correlation. In: Novais, P., Camacho, D., Analide, C., El Fallah Seghrouchni, A., Badica, C. (eds.) Intelligent Distributed Computing IX. SCI, vol. 616, pp. 427–437. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-25017-5_40
Rainham, D., McDowell, I., Krewski, D., Sawada, M.: Conceptualizing the healthscape: contributions of time geography, location technologies and spatial ecology to place and health research. Soc. Sci. Med. 70(5), 668–676 (2010)
Fallah, N., Apostolopoulos, I., Bekris, K., Folmer, E.: Indoor human navigation systems: a survey. Interact. Comput. 25, 21–33 (2013)
Duque Domingo, J., Cerrada, C., Valero, E., Cerrada, J.: Indoor positioning system using depth maps and wireless networks. J. Sens. 2016, 8 (2016)
Duque Domingo, J., Cerrada, C., Valero, E., Cerrada, J.A.: An improved indoor positioning system using RGB-D cameras and wireless networks for use in complex environments. Sensors 17(10), 2391 (2017)
Mautz, R., Tilch, S.: Survey of optical indoor positioning systems. In: Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal, 21–23 September 2011, pp. 1–7 (2011)
Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: EASE, vol. 8, pp. 68–77, June 2008
Skandhakumar, N., Reid, J., Dawson, E., Drogemuller, R., Salim, F.: An authorization framework using building information models. Comput. J. 55(10), 1244–1264 (2012)
Pasquale, L., et al.: Topology-aware access control of smart spaces. Computer 50(7), 54–63 (2017)
Hernández, J.L., Moreno, M.V., Jara, A.J., Skarmeta, A.F.: A soft computing based location-aware access control for smart buildings. Soft. Comput. 18(9), 1659–1674 (2014)
Satoh, I.: Spatial connector: mapping access control models for pervasive computing and cloud computing. Procedia Comput. Sci. 110, 174–181 (2017)
Gu, N., Singh, V., Taylor, C., London, K., Brankovic, L.: BIM adoption: expectations across disciplines. In: Handbook of Research on Building Information Modeling and Construction Informatics: Concepts and Technologies, pp. 501–520. IGI Global (2010)
ISO 16739:2013. https://www.iso.org/standard/51622.html
OASIS XACML Technical Committee. eXtensible access control markup language (XACML) Version 3.0. Oasis Standard, OASIS (2013)
Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 236–241. IEEE, August 2011
Hernández-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. (JISIS) 3(3/4), 1–16 (2013)
Elliott Bell, D.: Bell–La Padula model. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 74–79. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_811
Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)
Kim, Y.J., Kang, H.Y., Lee, J.: Development of indoor spatial data model using CityGML ADE. ISPRS-Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 1(2), 41–45 (2013)
Namiot, D., Sneps-Sneppe, M.: Geofence and network proximity. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2013. LNCS, vol. 8121, pp. 117–127. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40316-3_11
Young-Hyun, E., Young-Keun, C., Cho, S., Jeon, B.: FloGeo: a floatable three-dimensional geofence with mobility for the internet of things. J. Adv. Res. Dyn. Control Syst. 08-Special Issue, 114–120 (2017)
Rajpoot, Q.M., Jensen, C.D.: Video surveillance: privacy issues and legal compliance. In: Promoting Social Change and Democracy Through Information Technology, p. 69 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Greaves, B., Coetzee, M., Leung, W.S. (2018). Access Control Requirements for Physical Spaces Protected by Virtual Perimeters. In: Furnell, S., Mouratidis, H., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science(), vol 11033. Springer, Cham. https://doi.org/10.1007/978-3-319-98385-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-98385-1_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98384-4
Online ISBN: 978-3-319-98385-1
eBook Packages: Computer ScienceComputer Science (R0)