Skip to main content
Top

2018 | OriginalPaper | Chapter

Sensing Enabled Capabilities for Access Control Management

Authors : Mikel Uriarte, Oscar López, Jordi Blasi, Oscar Lázaro, Alicia González, Iván Prada, Eneko Olivares, Carlos E. Palau, Miguel A. Portugués, Alejandro García

Published in: Integration, Interconnection, and Interoperability of IoT Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Current knowledge and assets that support organizations competitiveness must be protected. This protection is highly dependent on a proper access control management. Unfortunately, traditional access control management approaches are rigid and isolated, constrained by proprietary requirements not easily interoperable. In this chapter, a new framework approach is presented and described. It provides a flexible, open, fluid and collaborative middleware for building access control management systems, based on the Sensing Enriched Access Control (SEAC) concept. This framework establishes the principles allowing the development of an access control management system that copes with today organization’s needs. The chapter also provides a description of a real use case raised to validate the framework, as well as the laboratory results supporting its scalability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Different countries have different CI classification, the European Union uses the one available https://​ec.​europa.​eu/​energy/​en/​topics/​infrastructure/​protection-critical-infrastructure.
 
Literature
1.
go back to reference Skinner, G.D.: Cyber security management of access controls in digital ecosystems and distributed environments. In: 6th International Conference on Information Technology and Applications (ICITA 2009), November (2009) Skinner, G.D.: Cyber security management of access controls in digital ecosystems and distributed environments. In: 6th International Conference on Information Technology and Applications (ICITA 2009), November (2009)
4.
go back to reference Giménez, P., Molina, B., Palau, C.E., Esteve, M.: Sensor web simulation and testing for the IoT. In: IEEE International conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, October (2013) Giménez, P., Molina, B., Palau, C.E., Esteve, M.: Sensor web simulation and testing for the IoT. In: IEEE International conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, October (2013)
5.
go back to reference Karp, A.H.: Authorization-based access control for the services oriented architecture. In: 4\(^{{\rm th}}\) International Conference on Creating, Connecting, and Collaborating through Computing (C5), January (2006) Karp, A.H.: Authorization-based access control for the services oriented architecture. In: 4\(^{{\rm th}}\) International Conference on Creating, Connecting, and Collaborating through Computing (C5), January (2006)
6.
go back to reference eXtensible Access Control Markup Language Version 3.0, OASIS XACML v. 3.0, August (2010) eXtensible Access Control Markup Language Version 3.0, OASIS XACML v. 3.0, August (2010)
10.
go back to reference Ferraiolo, D.F., Richard Kuhn, D.: Role-based access controls. In: 15\(^{{\rm th}}\) National Computer Security Conference, pp. 554–563 (1992) Ferraiolo, D.F., Richard Kuhn, D.: Role-based access controls. In: 15\(^{{\rm th}}\) National Computer Security Conference, pp. 554–563 (1992)
11.
go back to reference Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE Conference on Web Services (ICWS 2005), pp. 561–569 (2005) Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE Conference on Web Services (ICWS 2005), pp. 561–569 (2005)
12.
go back to reference Shen, H.: A semantic aware attribute-based access control model for web services. In: Lecture Notes in Computer Science, vol. 5574, pp. 693–703 (2009) Shen, H.: A semantic aware attribute-based access control model for web services. In: Lecture Notes in Computer Science, vol. 5574, pp. 693–703 (2009)
13.
go back to reference Shen, H.: A semantic context-based access control model for pervasive computing environments. In: Proceedings Advances in Intelligent and Soft Computing, vol. 168, pp. 135–140 (2012) Shen, H.: A semantic context-based access control model for pervasive computing environments. In: Proceedings Advances in Intelligent and Soft Computing, vol. 168, pp. 135–140 (2012)
14.
go back to reference Gunter, C.A., Liebovitz, D.M., Malin, B.: Experience-based access management: a life-cycle framework for identity and access management systems. 9(5), 48–55 (2011) Gunter, C.A., Liebovitz, D.M., Malin, B.: Experience-based access management: a life-cycle framework for identity and access management systems. 9(5), 48–55 (2011)
15.
go back to reference Liu, D., Li, N., Wang, X., Jean Camp, L.: Security risk management using incentives. In: Proceeding IEEE Security and Privacy, November, pp. 20–28 (2011) Liu, D., Li, N., Wang, X., Jean Camp, L.: Security risk management using incentives. In: Proceeding IEEE Security and Privacy, November, pp. 20–28 (2011)
16.
go back to reference Piccione, S., Gusmeroli, S., Rotondi, D.: A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58, 1189–1205 (2013)CrossRef Piccione, S., Gusmeroli, S., Rotondi, D.: A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58, 1189–1205 (2013)CrossRef
17.
go back to reference Fortino, G., Trunfio, P.: Internet of Things Based on Smart Objects, Technology, Middleware and Applications. Springer, Berlin (2014)CrossRef Fortino, G., Trunfio, P.: Internet of Things Based on Smart Objects, Technology, Middleware and Applications. Springer, Berlin (2014)CrossRef
18.
go back to reference Nguyena, K.T., Laurentb, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Elsevier Ad Hoc Netw. 32, 17–31 (2015)CrossRef Nguyena, K.T., Laurentb, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Elsevier Ad Hoc Netw. 32, 17–31 (2015)CrossRef
20.
go back to reference Kirkpatrick, M.S., Damiani, M.L., Bertino, E.: Prox-RBAC: a proximity-based spatially aware RBAC. In: Proceedings of the 19\(^{{\rm th}}\) ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS ’11, pp. 339–348. ACM, New York (2011) Kirkpatrick, M.S., Damiani, M.L., Bertino, E.: Prox-RBAC: a proximity-based spatially aware RBAC. In: Proceedings of the 19\(^{{\rm th}}\) ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS ’11, pp. 339–348. ACM, New York (2011)
21.
go back to reference Aich, S., Sural, S., Majumdar, A.K.: STARBAC: Spatio-temporal role based access control. In: Proceedings of the 2007 OTM Confederated International Conference on On the Move to Meaningful Inter net Systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, OTM’07, pp. 1567–1582. Springer, Berlin (2007) Aich, S., Sural, S., Majumdar, A.K.: STARBAC: Spatio-temporal role based access control. In: Proceedings of the 2007 OTM Confederated International Conference on On the Move to Meaningful Inter net Systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, OTM’07, pp. 1567–1582. Springer, Berlin (2007)
22.
go back to reference Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRef Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRef
24.
go back to reference Rotondi, D., Seccia, C., Piccione, S.: Access Control and IoT: Capability Based Authorization Access Control System, November (2011) Rotondi, D., Seccia, C., Piccione, S.: Access Control and IoT: Capability Based Authorization Access Control System, November (2011)
25.
go back to reference Skinner, G.D.: Cyber security management of access controls in digital ecosystems and distributed environments. In: 6th International Conference on Information Technology and Applications (ICITA 2009), November (2009) Skinner, G.D.: Cyber security management of access controls in digital ecosystems and distributed environments. In: 6th International Conference on Information Technology and Applications (ICITA 2009), November (2009)
Metadata
Title
Sensing Enabled Capabilities for Access Control Management
Authors
Mikel Uriarte
Oscar López
Jordi Blasi
Oscar Lázaro
Alicia González
Iván Prada
Eneko Olivares
Carlos E. Palau
Miguel A. Portugués
Alejandro García
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-61300-0_8