Visitor access control scheme utilizing social relationship in the real world

Gen Kitagata, Debasish Chakraborty, Satoshi Ogawa, Atushi Takeda, Kazuo Hashimoto, Norio Shiratori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.

Original languageEnglish
Title of host publicationIFIP Advances in Information and Communication Technology
PublisherSpringer New York LLC
Pages95-107
Number of pages13
Volume321
ISBN (Print)9783642134456
Publication statusPublished - 2010
Externally publishedYes
Event4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2010 - Morioka, Japan
Duration: 2010 Jun 162010 Jun 18

Publication series

NameIFIP Advances in Information and Communication Technology
Volume321
ISSN (Print)18684238

Other

Other4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2010
CountryJapan
CityMorioka
Period10/6/1610/6/18

Fingerprint

Access control
Social relationships
Role-based access control
Maintenance cost
Resources
Time constraints

Keywords

  • Access control
  • Collaborative work
  • Socialware
  • Symbiotic computing

ASJC Scopus subject areas

  • Information Systems and Management

Cite this

Kitagata, G., Chakraborty, D., Ogawa, S., Takeda, A., Hashimoto, K., & Shiratori, N. (2010). Visitor access control scheme utilizing social relationship in the real world. In IFIP Advances in Information and Communication Technology (Vol. 321, pp. 95-107). (IFIP Advances in Information and Communication Technology; Vol. 321). Springer New York LLC.

Visitor access control scheme utilizing social relationship in the real world. / Kitagata, Gen; Chakraborty, Debasish; Ogawa, Satoshi; Takeda, Atushi; Hashimoto, Kazuo; Shiratori, Norio.

IFIP Advances in Information and Communication Technology. Vol. 321 Springer New York LLC, 2010. p. 95-107 (IFIP Advances in Information and Communication Technology; Vol. 321).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kitagata, G, Chakraborty, D, Ogawa, S, Takeda, A, Hashimoto, K & Shiratori, N 2010, Visitor access control scheme utilizing social relationship in the real world. in IFIP Advances in Information and Communication Technology. vol. 321, IFIP Advances in Information and Communication Technology, vol. 321, Springer New York LLC, pp. 95-107, 4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2010, Morioka, Japan, 10/6/16.
Kitagata G, Chakraborty D, Ogawa S, Takeda A, Hashimoto K, Shiratori N. Visitor access control scheme utilizing social relationship in the real world. In IFIP Advances in Information and Communication Technology. Vol. 321. Springer New York LLC. 2010. p. 95-107. (IFIP Advances in Information and Communication Technology).
Kitagata, Gen ; Chakraborty, Debasish ; Ogawa, Satoshi ; Takeda, Atushi ; Hashimoto, Kazuo ; Shiratori, Norio. / Visitor access control scheme utilizing social relationship in the real world. IFIP Advances in Information and Communication Technology. Vol. 321 Springer New York LLC, 2010. pp. 95-107 (IFIP Advances in Information and Communication Technology).
@inproceedings{35bbe8df86e546f193ffee55b0fecac6,
title = "Visitor access control scheme utilizing social relationship in the real world",
abstract = "Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.",
keywords = "Access control, Collaborative work, Socialware, Symbiotic computing",
author = "Gen Kitagata and Debasish Chakraborty and Satoshi Ogawa and Atushi Takeda and Kazuo Hashimoto and Norio Shiratori",
year = "2010",
language = "English",
isbn = "9783642134456",
volume = "321",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "95--107",
booktitle = "IFIP Advances in Information and Communication Technology",

}

TY - GEN

T1 - Visitor access control scheme utilizing social relationship in the real world

AU - Kitagata, Gen

AU - Chakraborty, Debasish

AU - Ogawa, Satoshi

AU - Takeda, Atushi

AU - Hashimoto, Kazuo

AU - Shiratori, Norio

PY - 2010

Y1 - 2010

N2 - Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.

AB - Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.

KW - Access control

KW - Collaborative work

KW - Socialware

KW - Symbiotic computing

UR - http://www.scopus.com/inward/record.url?scp=79955720681&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79955720681&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:79955720681

SN - 9783642134456

VL - 321

T3 - IFIP Advances in Information and Communication Technology

SP - 95

EP - 107

BT - IFIP Advances in Information and Communication Technology

PB - Springer New York LLC

ER -