Title: Spatio-temporal XACML: the expansion of XACML for access control

Authors: Ki Young Lee; Aleum Kim; Ye Eun Jeon; Jeong Joon Kim; Yong Soon Im; Gyoo Seok Choi; Sang Bong Park; Yun Sik Lim; Jeong Jin Kang

Addresses: Department of Medical IT and Marketing, Eulji University, Seongnam, 461-713, Korea ' Department of Medical IT and Marketing, Eulji University, Seongnam, 461-713, Korea ' Department of Medical IT and Marketing, Eulji University, Seongnam, 461-713, Korea ' Division of Computer Science and Engineering, Konkuk University, Seoul, 143-701, Korea ' Department of Information Technology, Kookje University, Pyeongtaek, 459-721, Korea ' Department of Computer Science, Chungwoon University, Incheon, 402-803, Korea ' Department of Information and Comminication, Semyung University, Jecheon, 390-711, Korea ' Department of Broadcasting Production & Entertainment, Yeoju Institute of Technology, Yeoju, 469-705, Korea ' Department of Information and Communication, Dong Seoul University, Seongnam, 461-714, Korea

Abstract: eXtensible Access Control Markup Language (XACML) standardised by OCG was widely used in the area of information security. And recently geospatial XACML was standardised. But now, types of information are diversified. Especially, importance of information about time and space is continually increased. We use information to know where or when we do something. For instance, we usually check time or find the way with it. Therefore, Geospatial eXtensible Access Control Markup Language (GeoXACML) is not enough to cover it. In this paper, we propose that spatio-temporal XACML which can accept not only geospatial information but also temporal information. Spatio-temporal XACML is based on and expands standardised GeoXACML in OCG. Its scenario consists of access control between positions of polices.

Keywords: XACML; eXtensible Access Control Markup Language; GeoXACML; Geospatial eXtensible Access Control Markup Language; type; geospatial information; temporal information; spatio-temporal XACML; information security.

DOI: 10.1504/IJSN.2015.068412

International Journal of Security and Networks, 2015 Vol.10 No.1, pp.56 - 63

Available online: 28 Mar 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article