Research Article Dynamic Access Control Model for Security Client ...

4 downloads 22199 Views 2MB Size Report
Jun 18, 2014 - grid, a new access control security model is needed. This paper ..... for multi-domain cloud computing,” IEICE Transactions on. Information and ...
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 181760, 7 pages http://dx.doi.org/10.1155/2014/181760

Research Article Dynamic Access Control Model for Security Client Services in Smart Grid Sang-Soo Yeo,1 Si-Jung Kim,2 and Do-Eun Cho3 1

Division of Convergence Computer & Media, Mokwon University, Daejeon 302-729, Republic of Korea College of General Education, Hannam University, Daejeon 306-791, Republic of Korea 3 Innovation Center for Engineering Education, Mokwon University, Daejeon 302-729, Republic of Korea 2

Correspondence should be addressed to Do-Eun Cho; [email protected] Received 3 January 2014; Accepted 15 May 2014; Published 18 June 2014 Academic Editor: Jongsung Kim Copyright © 2014 Sang-Soo Yeo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In the next-generation intelligent power grid, known as the smart grid, various objects can access systems in several network environments, and, accordingly, access control security becomes critical. Thus, to provide users with secure services in the smart grid, a new access control security model is needed. This paper proposes a dynamic access model for secure user services in the smart grid environment. The proposed model analyzes the user’s various access contexts and chooses an appropriate context type among the predefined context types. And then it applies the context-based user security policy to allow the user’s access to services dynamically. Therefore, it provides stronger security services by permitting context information-applied security services and flexible access control in various network environments. It is expected that this study will be used to solve important access control issues when establishing the smart grid.

1. Introduction Recently, with the development of renewable energy, interest in efficient energy management has increased. The nextgeneration intelligent power grid, smart grid, unlike existing provider-centered one-way energy operation systems, is a two-way operating system in which consumers participate in energy use and operation [1–3]. In addition, smart grid technology, interlocked with home networks, allows the control of information appliances no matter when or where the user is. However, to securely provide these and other services, it is important to secure home network security, protect private information, and restrict access to home devices. For example, if a user requesting services receives authorization with his or her user information and receives the same services regardless of location, time, or access device, a severe security issue may occur if the user’s authority is stolen or the device is lost. In the infrastructure of existing services, access rights to a resource are granted only after the execution of a user authorization phase. In contrast, for the resources or services

executed in various network environments like the smart grid, the user’s accessibility should change depending on the ambient context information. Currently, the smart grid has a variety of security vulnerabilities. In particular, security measures for various network environments and corresponding new services are lacking [4–6]. Therefore, to provide secure user services according to ambient context, it is also necessary to provide dynamic, context-adaptive services. To this end, various sensors and computers should collect and effectively share environment information, find the contexts of the user and macroenvironment, and provide appropriate services for them. Context refers to the information that characterizes and defines the state of entities in the real world. Context awareness is a technical method of interacting with this context and characterizing a human’s current context [7]. Context awareness computing application technology includes methods based on the correlation between the user and services. Its implementation and application technologies can be devised in various forms [8–10]. Recently, security-related

2 areas that consider context awareness have received attention, and various studies on several security models have been actively carried out [11–13]. It is necessary to study a new access control security model, applying this to the smart grid environment to provide security services according to time, space, and user context. Access control is a well-known security mechanism to give access permission or denial message to an access request according to the predefined access policies, in which the system monitors and controls who can access the specific data and also what they can do onto that data. Unlike general access control, dynamic access control uses place (where), time (when), and purpose (why) according to context information as the conditions for access permission [14]. This paper proposes a dynamic access control model to provide users with secure services in the smart grid environment. The model proposed in this paper analyzes ambient context information according to context type and, accordingly, dynamically manages service authority for the users. In addition, the security levels are applied differently depending on the users’ context information, even to users with service authority. Thus, the proposed model provides context-adaptive security services and flexible access controls in the various network environments of the smart grid. In addition, it inspects ambient conditions in real time, dynamically grants access right differently depending on them, and provides more powerful security services than existing resource security services. This study is organized as follows. Section 2 examines two related models from among the existing access control security models. Section 3 proposes a model limiting dynamic access rights depending on changes in the ambient context information. Section 4 describes an application of the proposed model to the smart grid environment. Lastly, Section 5 concludes the paper and proposes future research topics.

2. Related Work This section examines two related areas of research: rolebased access control (RBAC) and the context awareness access control (CAAC) model. Additionally, it describes the necessity of a security model providing dynamic security services according to context in the smart grid environment. 2.1. Role-Based Access Control (RBAC). The RBAC model is a technology that does not give access rights to system resources by user or predefined access control rules, but by the group to which the user belongs, that is, the user’s role [15–19]. This model classifies rights not to the user unit but to the user’s role. In addition, the roles have a hierarchical structure, and through the structure ancestor’s access rights can be inherited to its descendants easily, and hence, access rights can be more effectively managed in this hierarchical structure. Figure 1 shows the characteristics of a general role-based control model. Sandhu et al. proposed role-based access control by classifying models into the following four kinds [20].

International Journal of Distributed Sensor Networks Role hierarchy User assignment Users

Permission assignment Roles

Permissions

. . .

Constraints

Sessions

Figure 1: Role-based access control model. Role hierarchy User assignment Users

Permission assignment Roles

Permissions

Context constraints Condition 1

Condition 2

···

Condition n

Figure 2: xoRBAC model.

(i) RBAC0 : role-based access control basic model. (ii) RBAC1 : basic model with the addition of role hierarchy, an inheritance concept. (iii) RBAC2 : basic model with the addition of context constraint conditions. (iv) RBAC3 : model integrating RBAC1 and RBAC2 The RBAC model classifies access rights by role and grants the responsibilities and rights of the individual user accordingly. Thus, by providing security services through the access control of the user for resources, it maximizes the efficiency of security management. However, the RBAC model cannot perform dynamic access control based on contexts such as time and space. Neumann and Strembeck proposed the xoRBAC model that limits role-based access control to use context information in access control decisions [21]. A context constraint describes the condition that satisfies a context information attribute to permit a specific calculation by limiting rolebased access control. Access control is limited by comparing the real value of the context information attributes with predefined conditions. The context constraints are formed of a tuple of context attribute, function, and condition. The decision regarding rights is made according to the rights of a specific subject or role. Thus, as in Figure 2, the context is a condition that limits the granting of rights. Rights relate to several context constraints, and, when all context constraints have true values, access is permitted. 2.2. Context Aware Access Control (CAAC). The CAAC model is an access control technology that uses context

International Journal of Distributed Sensor Networks

3

awareness by dynamically measuring the current context of the user’s access demand and evaluating it. In other words, it is a model that decides rights by adding context information to the existing RBAC model [22]. The CAAC model access control methods are given by the following four definitions [23, 24]. (i) Context type (CT): an element of context constraint that defines context information.

Users or roles

Permissions

Clause 1 Condition 1



Constraints

∪···

Clause 2 ∩··· ∩

Clause n

Condition i

A predicate of Context type

(1) Context set (CS): a set of all context types in an application CS = {CT1 , CT2 ⋅ ⋅ ⋅ CT𝑛 } ,

1 ≤ 𝑖 ≤ 𝑛.

(1)

Evaluated by Context implementation

Figure 3: CAAC authorization policy structure.

(2) Context implementation (CI): a function of context types defined by CI : CT1 × CT2 × ⋅ ⋅ ⋅ × CT𝑛 󳨀→ CT,

𝑛 ≥ 0.

(2)

(ii) Context constraint (CC): the definition of context information using CT in a formulaic form. (1) CC := Clause1 ∪ Clause2 ∪ ⋅ ⋅ ⋅ ∪ Clause𝑛 . (2) Clause := Condition1 ∩ Condition2 ∩ ⋅ ⋅ ⋅ ∩ Condition𝑖 . (3) Condition := . (4) CT is an element of CS. (5) OP is a logical operator in set {>, ≥, , where 𝑀 is an operation mode defined in {READ, APPEND, DELETE, UPDATE} and 𝑂 is a data object or data type, (4) 𝐶 is a context constraint in this policy. (iv) Data access (DA): an attempt to access specific information using the user’s role and context information. (1) DA = (𝑈, 𝑃, RC) where (2) 𝑈 is a user in the user set that issues this data access, (3) 𝑃 is the permission this user wants to acquire, (4) Runtime context (RC) is a set of values for every context type in the context set. DA (𝑈, 𝑃, RC) is granted if there exists an AP (𝑅, 𝑃󸀠 , 𝐶), (1) 𝑈 ∈ 𝑅 and

(2) 𝑃 = 𝑃󸀠 and (3) 𝐶 is evaluated as true under RC. Figure 3 shows the CAAC model’s policy decision process. This is similar to the RBAC model, but, by adding a context constraint element, it decides whether to grant rights according to a context value. 2.3. Demands for Dynamic Access Controlling. Recently published access control schemes have various characteristics for providing flexibility and security. Generalized temporal rolebased access control (GTRBAC) can give access rights under the time constraints and the periodical configuration [25, 26], Privacy role-based access control (PRABAC) can provide stronger privacy policy to the access time [27, 28]. And GeoRBAC model is considering the user location information before giving the access permission [29]. Nonetheless, the smart grid is not a simple architecture and it has many kinds of context and circumstances, the existing access control models can cover all aspects of the smart grid environment. In the smart grid environment, each model is distributed and arranged for cooperative performance and various objects may access the systems. This access control management for each object is very closely related to security issues. Thus, for efficient access control of smart grid, it is necessary to systematically analyze security requirements and a policy to solve them is needed. In addition, to apply access control policy more efficiently and consistently, an access control mechanism is necessary.

3. Dynamic Access Control Modeling (DACM) This section describes a dynamic access control model that can be applied to the smart grid environment for secure user services. Access control in the smart grid environment should consider scalability, accessibility for many users, and distinctiveness of two-way communication through a variety of equipment. The existing RBAC model controls access based on many roles in various contexts, so it has been difficult to prevent dynamic access. Therefore, this proposed model provides a dynamic access control for each contextbased CAAC model.

4

International Journal of Distributed Sensor Networks User Access allow/denial

Access request Authentication part Context aware manager Context data scanning

Authentication control

Permission management part Policy manager

Information provider and access control service

Role tagging Policy request

Resource request

Context repository User information and role

Constraint policy

Context knowledge

Policy

Resource in HNA

Figure 4: Overview of dynamic access control model.

3.1. Proposed DACM Structure. The proposed DACM model collects context information in the user authentication phase via the context awareness manager. In each domain, it performs mapping and follows the policy of the relevant DB. In the access right decision phase, it maps each domain, classifies the task, tags the roles, and applies the role in context. Context information type for dynamic access control in the proposed model is defined as follows. Context information is obtained by the user by scanning for environment information at the time of services access. Source context data types are listed below: (i) Regular Role ID, (ii) Password, (iii) Time Stamp Value, (iv) Location Type, (v) Location Value, (vi) Access Device, (vii) Access Format, (viii) Access Network type, (ix) Task Attribute. Figure 4 shows the structure of the proposed dynamic access control model. The model performs access control by real time context information as follows. Step 1. The user attempts access to a certain data entity using an already issued authentication key. For providing dynamic access, Access Ticket is issued with UserID, Session Key for runtime context (RC), and Share Key. Session Key can be created using the user’s current runtime context and its mapped information. Share Key is calculated from the user access key value. Access Ticket = {UserID ‖ Session Key for RC ‖ Share Key}

Step 2. The use of public services does not require an access license. For services for which different access license levels have been assigned, the user asks for an access right to the management server and waits for a response. Step 3. The system applies the metadata value entered in the basic role to grant a new Role ID. Role ID = {Regular Role ID, Time Stamp Value, Location Type, Access Device or Access Format, Task Attribute} Step 4. The granted Role ID forms a tuple in which the metadata are stored, and role tagging is carried out. Step 5. The tuple relevant to the tag-granted Role ID satisfies the condition specified in the relevant domain and the user receives the access license. In this case, even for already licensed Role IDs, the DB domain is decided by a Role new ID and regenerated according to the metadata value generated in the access and authorization is checked. Tuple format is (i) Role ID, (ii) Service Name, (iii) Data, (iv) Access Permission Check Value, (v) Rule Domain 3.2. Policy Management for a Secure Client Service. The constraint conditions for the policy management of the proposed model are as follows. The regular ID and the Domian ID of the user are verified, and then the user password is also verified. If the two values are correctly verified, access is granted. After the access is made, the data necessary for the user’s context awareness is scanned. The input values

International Journal of Distributed Sensor Networks

Sub

5

Actioni

ACTi Role

Domaini

UAC i

User 1

User i .. .

Tas ACTi . . . Tas Usri

Task attribute Tas Usri

User n

Rolei

.. .

RPA i

Permission i

CON Tasi Constraints n time stamp, location type, network type, device type

Rolen Service type

Figure 5: Overview of policy for access control model.

include Time Stamp Value, Location Type, Location Value, Access Device, Access Format, Access Network Type, and Task Attribute. First, Time Stamp Value checks if the time for the user access is authorized. Regarding the user’s Location Type, the user’s access network type is checked. Different security levels can be granted by network type. The Access Device has a limited range of available services according to device, so the access of the services and the results are decided by Access Format. In addition, the user’s basic right regarding the Task Attribute access services is checked. Definition of user’s context data constraint: (i) Role ID = if (DB Domain 1 ‖ DB Domain 2 ‖ DB Domain 𝑛) (ii) Password = if ((Passwordinput = Trust Password) = TRUE) (iii) Time Constraint = if (Time Stampinput > Time𝐶low && Time Stampinput < Time𝐶high ) (iv) Location Type = Switch (case 1 (in HAN), case 2 (in LAN), case 3 (in WAN), etc.) (v) Network Type = Switch (case 1 (use Zigbee), case 2 (use WCDMA), case 3 (use WiFi), case 4 (use Wibro), etc.) (vi) Access Device = Switch (case 1 (use Remot Contorller), case 2 (use Cellular Phone), case 3 (use Pc & Mobile), etc.) (vii) Access Format = if (Typeinput = (Type 1 ‖ Type 2 ‖ ⋅ ⋅ ⋅ Type 𝑛)) (viii) Task Atribute = ServiceRequest Task Type (Public ‖ Private ‖ Administrate) Figure 5 shows the policy management process of the proposed model.

(i) Sub, Domain: sets subject a and domains. (ii) Role𝑖 , Permission𝑖 : sets of Role, Permissions, Constraints and Actions in the 𝑖th domain for each 𝑖 member of Domain. (iii) User𝑖 : a function that determines the set of users in the 𝑖th domain for each 𝑖 member of Domain. (iv) RPA𝑖 : Roles X Permissions, a many-to-many role-topermission assignment relation. (v) UAC𝑖 : a function mapping each user in the 𝑖th domain to a set of Actions. (vi) AC T𝑖 : Actions X Roles, a many-to-many Action to permission assignment relation.

4. DACM for a Secure Client Service in the Smart Grid This section shows how to apply the suggested dynamic access control model to the smart grid environment specifically. The general existing access control model is designed properly for a single system, so some parts must be modified to handle the complexity of the smart grid. A proper access control model for the smart grid should efficiently manage many users, devices, and systems and should be able to conduct subtle control. The DACM flow suggested for the smart grid environment is shown in Figure 6. Role A can be defined as the user with upper network access rights in the smart grid environment. If the user requests services remotely to the home or office, the user’s access rights change dynamically with context. If the user requests services, then context information collection can be conducted at the same time as user certification. The user’s context information is collected by the context aware manager, and the context information follows the constraint rule of the context aware policy described in

6

International Journal of Distributed Sensor Networks ∙ Portal site ∙ Mobile monitoring and control ∙ Real time Web monitoring and control

User info. and roll

Context repository

Case role A ID Password Time stamp Location type Access device Task attribute

A

Service request

Context aware manager

Context data scanning

A Public service? Y

Role tagging A

a A Policy mapping

A

A ∙ Disaster situation notice ∙ Power measurement ∙ Information monitoring ∙ Smart device remote control

a

∙ Building information monitoring and control a ∙ Local information monitoring and control ∙ Disaster situation notice ∙ Smart device remote control

Policy repository a

a

Policy domain assignment

Policy repository B Policy repository

Figure 6: A control flow with the proposed DACM in smart grid.

Section 3. After that, role tagging is conducted by the policy manager, and the rights for Role A are decided. The mapping of policy DB about Role A is conducted by tagging Role A. Through this process, the relevant defined services and information regarding each role can be accessed in the policy DB. This results in an increase of the security of services for remote access or control services by the user in the smart grid. In addition, the user with a manager role in a home or enterprise network can provide proper services in a dynamic way by setting the various roles for service access or providing information about a variety of contexts. When the user requests remote services, the entered metadata value and the user’s context data are scanned for services access. The user can access to the data entities in various roles such as a general manager or system control manager in a home network or as a service provider in the smart grid environment. General-share services can be provided through a direct policy repository. When the home network user remotely accesses the smart grid environment by a basic Role ID, the rights policy limits the access to dynamic services according to the access context information.

5. Conclusions This paper proposes a novel dynamic access control model which provides security-enhanced data access services in the smart grid environment. The proposed model identifies each user’s role and current context. The user’s context can be

mapped to a certain predefined context type of the proposed model, and that context type is associated with an access policy which can control the user’s access privilege. The context-aware manager can manage this mapping process, collecting information about the user role, context, and requested service, and mapping the proper context type and access policy to the user. And the policy manager controls the role-tagging process for the user and applies the exact roles to the user finally. Consequently, the proposed access control model can control dynamically the user’s data access permissions. The proposed model applies different access security policies depending on context information even for the same user by judging whether to provide authority management and services dynamically according to the user’s context information. This provides security enhancements for overall smart grid services and resource access. Unlike the existing power grids, in the smart grid, various access objects such as users, devices, and systems can access systems along with two-way communication, and, accordingly, issues of access control and relevant security become important. Recently, various security models have been studied with respect to access control using context awareness, but the various services provided in a smart grid and access control in such an environment still have serious vulnerabilities. In consideration of the lack of studies on smart grid access control, it is expected that the model proposed in this study will be used to solve important access control issues when establishing the smart grid in the future.

International Journal of Distributed Sensor Networks

7

Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgment This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (no. 2014R1A1A1A05008391).

[15]

[16]

[17]

References [1] B. Vaidya, S. S. Yeo, D. Y. Choi, and S. Han, “Robust and secure routing scheme for wireless multihop network,” Personal and Ubiquitous Computing, vol. 13, no. 7, pp. 457–469, 2009. [2] H. Shen and Y. Cheng, “A semantic-aware context-based access control framework for mobile web Services,” Applied Mechanics and Materials, vol. 195-196, pp. 498–503, 2012. [3] S. ben Ayed and F. Teraoka, “Collaborative access control for multi-domain cloud computing,” IEICE Transactions on Information and Systems, vol. 95, no. 10, pp. 2401–2414, 2012. [4] S.-S. Yeo, D.-J. Kang, and J. H. Park, “Intelligent decisionmaking system with green pervasive computing for renewable energy business in electricity markets on smart grid,” Eurasip Journal on Wireless Communications and Networking, vol. 2009, Article ID 247483, 12 pages, 2009. [5] NIST, Smart Grid Cyber Security Strategy and Requirements, CSCTG (Cyber Security Coordination Task Group), 2009. [6] Cisco White Paper, Security for the Smart Grid, 2009. [7] D. E. Cho, B. S. Koh, and S. S. Yeo, “Secure D-CAS system for digital contents downloading services,” Journal of Supercomputing, vol. 64, no. 2, pp. 477–491, 2013. [8] M. Younas and I. Awan, “Mobility management scheme for context-aware transactions in pervasive and mobile cyberspace,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1108–1115, 2013. [9] R. Tan, J. Gu, Z. Zhong, and P. Chen, “Metadata management of context resources in context-aware middleware system,” in Web Information Systems and Mining, vol. 7529 of Lecture Notes in Computer Science, pp. 350–357, Springer, Berlin, Germany, 2012. [10] L. Zhou, N. Xiong, L. Shu, A. Vasilakos, and S. S. Yeo, “Contextaware middleware for multimedia services in heterogeneous networks,” IEEE Intelligent Systems, vol. 25, no. 2, pp. 40–47, 2010. [11] E. Tong, W. Niu, H. Tang, G. Li, and Z. Zhao, “Reasoning-based context-aware workflow management in wireless sensor network,” in Service-Oriented Computing - ICSOC 2011 Workshops, vol. 7221 of Lecture Notes in Computer Science, pp. 270–282, Springer, Berlin, Germany, 2012. [12] D. J. Xue and W. X. Zhang, “Design and implement of dynamic context-aware monitoring system based on OWL,” Advanced Materials Research, vol. 532, pp. 1022–6680, 2012. [13] M. Netter, S. Hassan, and G. Pernul, “An autonomous social web privacy infrastructure with context-aware access control,” in Trust, Privacy and Security in Digital Business, vol. 7449 of Lecture Notes in Computer Science, pp. 65–78, Springer, Berlin, Germany, 2012. [14] M. Nakamura, S. Matsuo, and S. Matsumoto, “Supporting enduser development of context-aware services in home network

[18]

[19]

[20]

[21]

[22]

[23]

[24]

[25]

[26]

[27]

[28]

[29]

system,” Studies in Computational Intelligence, vol. 443, pp. 159– 170, 2013. D. F. Ferraiolo, J. A. Cugini, and D. R. Kuhn, “Role-Based Access Control (RABC): features and motivations,” in Proceedings of the 11th Annual Computer Security Applications Conferences, pp. 241–248, 1995. M. J. Moyer and M. Ahamad, “Generalized role-based access control,” in Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS ’01), pp. 391–398, April 2001. J. Barkley, K. Beznosov, and J. Uppal, “Supporting relationships in access control using role based access control,” in Proceedings of the 4th ACM Workshop on Role Based Access Control, pp. 55– 65, 1999. R. Sandhu, D. Ferraiolo, and R. Kuhn, “NIST model for rolebased access control: towards a unified standard,” in Proceedings of the 5th ACM Workshop on Role-Based Access Control, pp. 47– 63, Berlin, Germany, July 2000. D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn, “A role based access control model and reference implementation within a corporate intranet,” ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 34–64, 1999. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Computer role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, 1996. G. Neumann and M. Strembeck, “An approach to engineer and enforce context constraints in an RBAC environment,” in Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT ’03), pp. 65–79, Como, Italy, June 2003. G. Ahang and M. Parashar, “Dynamic context-aware access control for grid application,” in The 4th International Workshop on Grid computing, pp. 101–108, 2003. D. M. Kim and J. O. Kim, “Design of emergency demand response program using analytic hierarchy process,” IEEE Transactions on Smart Grid, vol. 3, no. 2, pp. 635–644, 2012. J. Hu and A. C. Weaver, “A dynamic, context-aware security infrastructure for distributed healthcare applications,” in Proceedings of the 1st Workshop on Pervasive Privacy Security, Privacy, and Trust, 2004. J. B. D. Joshi, E. Bertino, and A. Ghafoor, “Hybrid role hierarchy for generalized temporal role based access control model,” in Proceedings of the 26th Annual International Computer Software and Applications Conference, pp. 951–956, August 2002. J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, “A generalized temporal role-based access control model,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 4–23, 2005. A. F. A. Dafa-Alla, E. H. Kim, K. H. Ryu, and Y. J. Heo, “PRBAC: An extended role based access control for privacy preserving data mining,” in Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS ’05), pp. 68–73, July 2006. Q. Ni, E. Bertino, J. Lobo, and S. B. Calo, “Privacy-aware rolebased access control,” IEEE Security and Privacy, vol. 7, no. 4, pp. 35–43, 2009. E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca, “GEORBAC: a spatially aware RBAC,” in Proceedings of 10th ACM Symposium on Access Control Models and Technologies (SACMAT ’05), pp. 29–37, swe, June 2005.

International Journal of

Rotating Machinery

Engineering Journal of

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

The Scientific World Journal Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

International Journal of

Distributed Sensor Networks

Journal of

Sensors Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Journal of

Control Science and Engineering

Advances in

Civil Engineering Hindawi Publishing Corporation http://www.hindawi.com

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014

Submit your manuscripts at http://www.hindawi.com Journal of

Journal of

Electrical and Computer Engineering

Robotics Hindawi Publishing Corporation http://www.hindawi.com

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014

VLSI Design Advances in OptoElectronics

International Journal of

Navigation and Observation Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Hindawi Publishing Corporation http://www.hindawi.com

Chemical Engineering Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014

Active and Passive Electronic Components

Antennas and Propagation Hindawi Publishing Corporation http://www.hindawi.com

Aerospace Engineering

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014

International Journal of

International Journal of

International Journal of

Modelling & Simulation in Engineering

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Shock and Vibration Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Advances in

Acoustics and Vibration Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Suggest Documents