{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T07:05:19Z","timestamp":1694934319357},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,8,21]],"date-time":"2013-08-21T00:00:00Z","timestamp":1377043200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s00607-013-0340-2","type":"journal-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T05:01:40Z","timestamp":1376974900000},"page":"313-353","source":"Crossref","is-referenced-by-count":10,"title":["Enforcing spatio-temporal access control in mobile applications"],"prefix":"10.1007","volume":"96","author":[{"given":"Ramadan","family":"Abdunabi","sequence":"first","affiliation":[]},{"given":"Wuliang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,21]]},"reference":[{"key":"340_CR1","doi-asserted-by":"crossref","unstructured":"Schaad A, Moffett J (2002) A lightweight approach to specification and analysis of role-based access control extensions. In: Proceedings of the symposium on access control models and technologies (SACMAT), pp 13\u201322","DOI":"10.1145\/507711.507714"},{"key":"340_CR2","first-page":"13","volume":"1","author":"A Anne","year":"2004","unstructured":"Anne A (2004) XACML profile for role-based access control (RBAC). OASIS Access Control TC Comm Draft 1:13","journal-title":"OASIS Access Control TC Comm Draft"},{"key":"340_CR3","unstructured":"Samuel A, Ghafoor A, Bertino E (2007) A framework for specification and verification of generalized spatio-temporal role based access control model. Technical report CERIAS TR 2007\u201308, Purdue University, West Lafayette"},{"key":"340_CR4","doi-asserted-by":"crossref","unstructured":"Chaudhuri A (2009) Language-based security on Android. In: Proceedings of the ACM workshop on programming languages and analysis for security (PLAS), pp 1\u20137","DOI":"10.1145\/1554339.1554341"},{"key":"340_CR5","doi-asserted-by":"crossref","unstructured":"Shafiq B, Masood A, Joshi J, Ghafoor A (2005) A role-based access control policy verification framework for real-time systems. In: Proceedings of the workshop on object-oriented real-time dependable systems (WORDS), pp 13\u201320","DOI":"10.1109\/WORDS.2005.11"},{"key":"340_CR6","doi-asserted-by":"crossref","unstructured":"Bose B, Sane S (2010) DTCOT: distributed timeout based transaction commit protocol for mobile database systems. In: Proceedings of the international conference and workshop on emerging trends in technology (ICWET), Mumbai, India, pp 518\u2013523","DOI":"10.1145\/1741906.1742024"},{"key":"340_CR7","unstructured":"Kim D-K, Ray I, France RB, Li N (2004) Modeling role-based access control using parameterized UML models. In: Proceedings of the 7th international conference FASE\u20192004, pp 180\u2013193"},{"issue":"2","key":"340_CR8","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1145\/505145.505149","volume":"11","author":"J Daniel","year":"2002","unstructured":"Daniel J (2002) Alloy: a lightweight object modelling notation. ACM Trans Softw Eng Methodol 11(2):256\u2013290","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"340_CR9","doi-asserted-by":"crossref","unstructured":"Daniel M, Gerald P, Richard M (1980) A locking protocol for resource coordination in distributed databases. ACM Trans Database Syst 5(2):103\u2013138","DOI":"10.1145\/320141.320143"},{"key":"340_CR10","unstructured":"Technische Universit\u00e4t Darmstadt. FlexiProvider. http:\/\/www.flexiprovider.de\/overview.html\/ . Accessed on 30 Nov 2012"},{"key":"340_CR11","doi-asserted-by":"crossref","unstructured":"Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: Proceedings of the ACM symposium on access control models and technologies (SACMAT), pp 29\u201337","DOI":"10.1145\/1063979.1063985"},{"key":"340_CR12","doi-asserted-by":"crossref","unstructured":"Bertino E, Piero B, Elena F (2001) TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191\u2013233","DOI":"10.1145\/501978.501979"},{"key":"340_CR13","doi-asserted-by":"crossref","unstructured":"Sposaro F, Tyson G (2009) iFall: an Android application for fall monitoring and response. In: Proceedings of the annual international conference of the IEEE at Engineering in Medicine and Biology Society (EMBC), 3\u20136 Sept 2009, pp 6119\u20136122","DOI":"10.1109\/IEMBS.2009.5334912"},{"key":"340_CR14","unstructured":"Frank S, Window S (2004) Threat modeling (Microsoft professional). Microsoft Press, Redmond (ISBN: 0735619913)"},{"key":"340_CR15","unstructured":"Hansen F, Oleshchuk V (2003) SRBAC: a spatial role-based access control model for mobile systems. In: Proceedings of the 8th Nordic workshop secure IT systems (NORDSEC), pp 129\u2013141"},{"key":"340_CR16","unstructured":"Ahn G, Shin M (2001) Role-based authorization constraints specification using object constraint language. In: Proceedings of the IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises (WETICE), pp 157\u2013162"},{"key":"340_CR17","doi-asserted-by":"crossref","unstructured":"Gail-Joon A, Ravi S (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3(4):207\u2013226","DOI":"10.1145\/382912.382913"},{"key":"340_CR18","unstructured":"US Government (2012) Global positioning system. http:\/\/www.gps.gov\/ . Accessed on 30 Nov 2012"},{"key":"340_CR19","unstructured":"Booch G, James R, Ivar J (2005) The unified modeling language user guide, 2nd edn. Addison-Wesley Professional, Boston"},{"key":"340_CR20","unstructured":"Grisham P, Chen C, Khurshid S, Perry D (2006) Design and validation of a security model with the Alloy analyzer. In: Proceedings of the workshop at ACM SIGSOFT first Alloy, 6th Nov 2006, Portland, OR, USA"},{"key":"340_CR21","unstructured":"Google Inc. (2012) Android SDK. http:\/\/developer.android.com\/sdk\/index.html . Accessed on 30 Nov 2012"},{"key":"340_CR22","unstructured":"Google Inc. (2012) The Android mobile (OS). http:\/\/www.android.com\/ . Accessed on 30 Nov 2012"},{"key":"340_CR23","doi-asserted-by":"crossref","unstructured":"Ray I, Kumar M, Yu L (2006) LRBAC: a location-aware role-based access control model. In: Proceedins of the 2nd international conference on information systems security (ICISS 2006), 17\u201321 Dec 2006, Indian Statistical institute, Kolkata, India, pp 147\u2013161","DOI":"10.1007\/11961635_10"},{"key":"340_CR24","doi-asserted-by":"crossref","unstructured":"Ray I, Toahchoodee M (2007) A spatio-temporal role-based access control model. In: Proceedings of the DBSec, pp 211\u2013226","DOI":"10.1007\/978-3-540-73538-0_16"},{"key":"340_CR25","doi-asserted-by":"crossref","unstructured":"Jaehong P, Ravi S (2004) The $$\\text{ UCON }_{\\text{ ABC }}$$ UCON ABC usage control model. ACM Trans Inf Syst Secur 7(1):128\u2013174","DOI":"10.1145\/984334.984339"},{"key":"340_CR26","unstructured":"James J, Elisa B, Usman L, Arif G (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323"},{"key":"340_CR27","doi-asserted-by":"crossref","unstructured":"James J, Elisa B, Usman L, Arif G (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323","DOI":"10.1109\/TKDE.2005.1"},{"key":"340_CR28","volume-title":"Applying UML and patterns: an introduction to object-oriented analysis and design and iterative development","author":"C Larman","year":"2004","unstructured":"Larman C (2004) Applying UML and patterns: an introduction to object-oriented analysis and design and iterative development, 3rd edn. Prentice Hall, Englewood Cliffs","edition":"3"},{"key":"340_CR29","doi-asserted-by":"crossref","unstructured":"Chen L, Crampton J (2008) On spatio-temporal constraints and inheritance in role-based access control. In: Proceedings of the ACM symposium on information, computer and communications security (ASIACCS), Mar 2008, pp 205\u2013216","DOI":"10.1145\/1368310.1368341"},{"key":"340_CR30","unstructured":"Lin A, Bond M, Clulow J (2007) Modeling partial attacks with Alloy. In: Proceedings of the workshop on security protocols, pp 20\u201333"},{"key":"340_CR31","unstructured":"Lockhart H, Parducci B, Levinson R (2012) OASIS eXtensible access control markup language (XACML) TC. http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml\/ . Accessed on 30 Nov 2012"},{"key":"340_CR32","unstructured":"Tamer \u00d6zsu M, Valduriez P (1999) Principles of distributed database systems, 2nd edn. Prentice-Hall, Englewood cliffs (ISBN-10: 1441988335)"},{"key":"340_CR33","doi-asserted-by":"crossref","unstructured":"Toahchoodee M, Ray I (2011) On the formalization and analysis of a spatio-temporal role-based access control model. J Comput Secur 19(3):399\u2013452","DOI":"10.3233\/JCS-2010-0418"},{"key":"340_CR34","doi-asserted-by":"crossref","unstructured":"Toahchoodee M, Ray I, Anastasakis K, Georg G, Bordbar B (2009) Ensuring spatio-temporal access control for real-world applications. In: Proceedings of the 13th ACM symposium on access control models and technologies (SACMAT), Estes Park, CO, USA, 11\u201313 June 2008 pp 13\u201322","DOI":"10.1145\/1542207.1542212"},{"key":"340_CR35","doi-asserted-by":"crossref","unstructured":"Manuel K, Francesco P-P (2006) UML specification of access control policies and their formal verification. Softw Syst Modell 5(4):429\u2013447","DOI":"10.1007\/s10270-006-0030-z"},{"key":"340_CR36","volume-title":"Writing secure code","author":"H Michael","year":"2002","unstructured":"Michael H, David L (2002) Writing secure code, 2nd edn. Microsoft Press, Redmond (ISBN: 0735617228)","edition":"2"},{"key":"340_CR37","doi-asserted-by":"crossref","unstructured":"Kirkpatrick M, Bertino E (2010) Enforcing spatial constraints for mobile RBAC systems. In: Proceedings of the 15th ACM symposium on access control models and technologies (SACMAT), Pittsburgh, pp 99\u2013108","DOI":"10.1145\/1809842.1809860"},{"key":"340_CR38","doi-asserted-by":"crossref","unstructured":"Xu M, Wijesekera D (2009) A role-based XACML administration and delegation profile and its enforcement architecture. In: Proceedings of the 6th ACM workshop on secure web services (SWS), 13 Nov 2009, Chicago, IL, USA, pp 53\u201360","DOI":"10.1145\/1655121.1655132"},{"key":"340_CR39","unstructured":"MySQL (2012) The world\u2019s most popular open source database. http:\/\/www.mysql.com\/ . Accessed on 30 Nov 2012"},{"key":"340_CR40","doi-asserted-by":"crossref","unstructured":"Abdunabi R, Al-Lail M, Ray I, Robert B (2013) Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model. IEEE Syst J (to be appear)","DOI":"10.1109\/JSYST.2013.2242751"},{"key":"340_CR41","doi-asserted-by":"crossref","unstructured":"Ravi S, Edward C, Hal F, Charles Y (1996) Role-based access control models. IEEE Comput 29(2):38\u201347","DOI":"10.1109\/2.485845"},{"key":"340_CR42","unstructured":"Ravi S, Kumar R, Xinwen Z (2006) Secure information sharing enabled by trusted computing and PEI models. In: Proceedings of the ACM symposium on information, computer and communications security (ASIACCS\u201906), 21\u201324 Mar 2006, Taipei, Taiwan"},{"key":"340_CR43","doi-asserted-by":"crossref","unstructured":"Mondal S, Sural S (2008) Security analysis of temporal-RBAC using timed automata. In: Proceedings of the 4th international symposium on information assurance and security (IAS), 8\u201310 Sept 2008, pp 37\u201340","DOI":"10.1109\/IAS.2008.10"},{"key":"340_CR44","unstructured":"Ravi S (1995) Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM workshop on role-based access control"},{"key":"340_CR45","unstructured":"Subhendu A, Samrat M, Shamik S, Arun M (2009) Role based access control with spatiotemporal context for mobile applications. Trans Comput Sci 4:177\u2013199"},{"key":"340_CR46","unstructured":"Subhendu A, Shamik S, Arun M (2007) STARBAC: spatio temporal role based access control. In: Proceedings of the OTM, pp 1567\u20131582"},{"key":"340_CR47","unstructured":"Syed A, Mohammad I (2011) Location-based services handbook: applications, technologies, and security. CRC Press, Boca Raton (ISBN: 1420071963)"},{"key":"340_CR48","doi-asserted-by":"crossref","unstructured":"Taghdiri M, Jackson D (2003) A lightweight formal analysis of a multicast key management scheme. In: Proceedings of the FORTE, pp 240\u2013256","DOI":"10.1007\/978-3-540-39979-7_16"},{"key":"340_CR49","unstructured":"Arensman W, Whipple J, Boler M (2009) A public safety application of GPS-enabled smartphones and the Android operating system. In: Proceedings of the systems, man and cybernetics (SMC), pp 2059\u20132061"},{"key":"340_CR50","doi-asserted-by":"crossref","unstructured":"Sun W, France R, Ray I (2011) Rigorous analysis of UML access control policy models. In: Proceedings of the POLICY, pp 9\u201316","DOI":"10.1109\/POLICY.2011.30"},{"key":"340_CR51","doi-asserted-by":"crossref","unstructured":"Yu L, France RB, Ray I (2008) Scenario-based static analysis of UML class models. In: Proceedings of the ACM\/IEEE 11th international conference on model driven engineering languages and systems (MoDELS), Toulouse, France, pp 234\u2013248","DOI":"10.1007\/978-3-540-87875-9_17"},{"key":"340_CR52","doi-asserted-by":"crossref","unstructured":"Yu L, France RB, Ray I, Sun W (2012) Systematic scenario-based analysis of UML design class models. In: Proceedings of a ICECCS meeting held 18\u201320 July 2012, Paris, France, pp 86\u201395","DOI":"10.1109\/ICECCS20050.2012.6299204"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0340-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0340-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0340-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T06:38:55Z","timestamp":1596350335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0340-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,21]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["340"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0340-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,21]]}}}