Abstract
Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.
Chapter PDF
Similar content being viewed by others
References
Kinoshita, T., Konno, S., Kitagata, G., Uchiya, T., Hara, H.: Symbiotic System: Co-existence and Mutual Respect of Human, Society, Environment, and Information System, Forward: Socialware. IPSJ 47(8), 817–824 (2006)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Model. Computer 29(2), 38–47 (1996)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Trans. Information and System Security 4(3), 191–233 (2001)
Nagao, M., Keeni, G.M., Ishigaki, M., Togashi, A., Noguchi, S.: A Secure Distributed Database System with Time-series Data and Social-Relation Based Information Access Control. IEICE Technical Report 107(6), 55–60
Fujita, S., Hara, H., Sugawara, K., Kinoshita, T., Shiratori, N.: Agent-based design model of adaptive distributed systems. The International Journal of Artificial Intelligence, Neural Networks and Complex Problem-Solving Technologies 9(1), 57–70 (1998)
Uchiya, T., Maemura, T., Sugawara, K., Kinoshita, T.: Interactive Design Environment for Agent-Based System. Transaction of the Institute of Electronics, Information and Communication Engineers. D-I J88-D-I(9), 1344–1355
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Kitagata, G., Chakraborty, D., Ogawa, S., Takeda, A., Hashimoto, K., Shiratori, N. (2010). Visitor Access Control Scheme Utilizing Social Relationship in the Real World. In: Nishigaki, M., Jøsang, A., Murayama, Y., Marsh, S. (eds) Trust Management IV. IFIPTM 2010. IFIP Advances in Information and Communication Technology, vol 321. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13446-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-13446-3_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13445-6
Online ISBN: 978-3-642-13446-3
eBook Packages: Computer ScienceComputer Science (R0)