Abstract
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions: first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research: (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and (iii) formulating design criteria for facilities and working environments for optimal LBAC usage.
Original language | Undefined |
---|---|
Title of host publication | Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010) |
Place of Publication | Los Alamitos, CA |
Publisher | IEEE Computer Society |
Pages | 739-746 |
Number of pages | 8 |
ISBN (Print) | 978-1-4244-9779-9 |
DOIs | |
Publication status | Published - 3 Nov 2010 |
Event | 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010 - Hangzhou, China Duration: 18 Dec 2010 → 20 Dec 2010 Conference number: 3 |
Publication series
Name | |
---|---|
Publisher | IEEE Computer Society |
Conference
Conference | 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010 |
---|---|
Abbreviated title | CPSCom 2010 |
Country | China |
City | Hangzhou |
Period | 18/12/10 → 20/12/10 |
Keywords
- IR-74984
- METIS-271164
- LBAC
- SCS-Cybersecurity
- EWI-18957
- contextsensitive access control
- SCS-Services
- Location-based access control