Privacy-enhanced Location-based Access Control View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2008-01-01

AUTHORS

C.A. Ardagna , M. Cremonini , S. De Capitani di Vimercati , P. Samarati

ABSTRACT

Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of users and other attributes related to the users location. Since privacy is extremely important for users, protection of their location information is paramount to the success of such emerging location-based services.In this chapter, we first present an overview of Location-based Access Control systems and then characterize the location privacy protection problem. We then discuss the main techniques that have been proposed to protect location information, focusing on the obfuscation-based techniques. We conclude the chapter by showing a privacy-aware LBAC architecture and describing how a location-based access control policy can be evaluated. More... »

PAGES

531-552

Book

TITLE

Handbook of Database Security

ISBN

978-0-387-48532-4
978-0-387-48533-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-48533-1_22

DOI

http://dx.doi.org/10.1007/978-0-387-48533-1_22

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1004099010


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4708.b", 
          "name": [
            "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ardagna", 
        "givenName": "C.A.", 
        "id": "sg:person.010474304203.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010474304203.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4708.b", 
          "name": [
            "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cremonini", 
        "givenName": "M.", 
        "id": "sg:person.013561353723.05", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013561353723.05"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4708.b", 
          "name": [
            "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vimercati", 
        "givenName": "S. De Capitani di", 
        "id": "sg:person.013064616524.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013064616524.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4708.b", 
          "name": [
            "Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, 26013 Crema, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Samarati", 
        "givenName": "P.", 
        "id": "sg:person.014155725052.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014155725052.10"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008-01-01", 
    "datePublishedReg": "2008-01-01", 
    "description": "Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of users and other attributes related to the users location. Since privacy is extremely important for users, protection of their location information is paramount to the success of such emerging location-based services.In this chapter, we first present an overview of Location-based Access Control systems and then characterize the location privacy protection problem. We then discuss the main techniques that have been proposed to protect location information, focusing on the obfuscation-based techniques. We conclude the chapter by showing a privacy-aware LBAC architecture and describing how a location-based access control policy can be evaluated.", 
    "editor": [
      {
        "familyName": "Gertz", 
        "givenName": "Michael", 
        "type": "Person"
      }, 
      {
        "familyName": "Jajodia", 
        "givenName": "Sushil", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-48533-1_22", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-0-387-48532-4", 
        "978-0-387-48533-1"
      ], 
      "name": "Handbook of Database Security", 
      "type": "Book"
    }, 
    "keywords": [
      "location-based services", 
      "access control system", 
      "location information", 
      "traditional access control mechanisms", 
      "privacy protection problem", 
      "access control mechanism", 
      "access control policies", 
      "control system", 
      "access control", 
      "user location", 
      "users", 
      "protection problems", 
      "such services", 
      "control policies", 
      "physical position", 
      "technology reliability", 
      "main techniques", 
      "control mechanisms", 
      "services", 
      "information", 
      "privacy", 
      "access conditions", 
      "architecture", 
      "important category", 
      "system", 
      "technique", 
      "attributes", 
      "location", 
      "reliability", 
      "precision", 
      "advancement", 
      "overview", 
      "chapter", 
      "use", 
      "success", 
      "position", 
      "development", 
      "control", 
      "categories", 
      "protection", 
      "policy", 
      "mechanism", 
      "conditions", 
      "problem", 
      "location technologies reliability", 
      "overview of Location", 
      "location privacy protection problem", 
      "obfuscation-based techniques", 
      "privacy-aware LBAC architecture", 
      "LBAC architecture", 
      "location-based access control policy", 
      "Privacy-enhanced Location"
    ], 
    "name": "Privacy-enhanced Location-based Access Control", 
    "pagination": "531-552", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1004099010"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-48533-1_22"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-48533-1_22", 
      "https://app.dimensions.ai/details/publication/pub.1004099010"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_226.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-48533-1_22"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-48533-1_22'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-48533-1_22'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-48533-1_22'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-48533-1_22'


 

This table displays all metadata directly associated to this object as RDF triples.

138 TRIPLES      23 PREDICATES      76 URIs      69 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-48533-1_22 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Na3d80de57d914b77b9da6d0c9940b27a
4 schema:datePublished 2008-01-01
5 schema:datePublishedReg 2008-01-01
6 schema:description Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of users and other attributes related to the users location. Since privacy is extremely important for users, protection of their location information is paramount to the success of such emerging location-based services.In this chapter, we first present an overview of Location-based Access Control systems and then characterize the location privacy protection problem. We then discuss the main techniques that have been proposed to protect location information, focusing on the obfuscation-based techniques. We conclude the chapter by showing a privacy-aware LBAC architecture and describing how a location-based access control policy can be evaluated.
7 schema:editor N7ffe6872007a43258d1e5323093325d1
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Na9cdae2e86ae4f449a56040825c1ac09
12 schema:keywords LBAC architecture
13 Privacy-enhanced Location
14 access conditions
15 access control
16 access control mechanism
17 access control policies
18 access control system
19 advancement
20 architecture
21 attributes
22 categories
23 chapter
24 conditions
25 control
26 control mechanisms
27 control policies
28 control system
29 development
30 important category
31 information
32 location
33 location information
34 location privacy protection problem
35 location technologies reliability
36 location-based access control policy
37 location-based services
38 main techniques
39 mechanism
40 obfuscation-based techniques
41 overview
42 overview of Location
43 physical position
44 policy
45 position
46 precision
47 privacy
48 privacy protection problem
49 privacy-aware LBAC architecture
50 problem
51 protection
52 protection problems
53 reliability
54 services
55 success
56 such services
57 system
58 technique
59 technology reliability
60 traditional access control mechanisms
61 use
62 user location
63 users
64 schema:name Privacy-enhanced Location-based Access Control
65 schema:pagination 531-552
66 schema:productId N932556fd1f5c4214839fb74b2f0db9a0
67 Nd15d9319e00240d49b413c4126a3a554
68 schema:publisher N0a8ef787a4f64b6c8381089c0a389b57
69 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004099010
70 https://doi.org/10.1007/978-0-387-48533-1_22
71 schema:sdDatePublished 2022-01-01T19:13
72 schema:sdLicense https://scigraph.springernature.com/explorer/license/
73 schema:sdPublisher N8661747f66b344558d8a8efc56c06fbb
74 schema:url https://doi.org/10.1007/978-0-387-48533-1_22
75 sgo:license sg:explorer/license/
76 sgo:sdDataset chapters
77 rdf:type schema:Chapter
78 N00f80bade187477cb12d4e9e6194d9a8 rdf:first N0b2e5ee6f8d94a80bac6178bbc5e529c
79 rdf:rest rdf:nil
80 N0a8ef787a4f64b6c8381089c0a389b57 schema:name Springer Nature
81 rdf:type schema:Organisation
82 N0b2e5ee6f8d94a80bac6178bbc5e529c schema:familyName Jajodia
83 schema:givenName Sushil
84 rdf:type schema:Person
85 N13e7ff36b6ac4c3582a4e6d729fab919 rdf:first sg:person.014155725052.10
86 rdf:rest rdf:nil
87 N7ffe6872007a43258d1e5323093325d1 rdf:first Nd8245ed76b644ecf849259cce22119a3
88 rdf:rest N00f80bade187477cb12d4e9e6194d9a8
89 N8661747f66b344558d8a8efc56c06fbb schema:name Springer Nature - SN SciGraph project
90 rdf:type schema:Organization
91 N932556fd1f5c4214839fb74b2f0db9a0 schema:name doi
92 schema:value 10.1007/978-0-387-48533-1_22
93 rdf:type schema:PropertyValue
94 Na3d80de57d914b77b9da6d0c9940b27a rdf:first sg:person.010474304203.39
95 rdf:rest Na9e6298363174569993d813943e8a7c8
96 Na9cdae2e86ae4f449a56040825c1ac09 schema:isbn 978-0-387-48532-4
97 978-0-387-48533-1
98 schema:name Handbook of Database Security
99 rdf:type schema:Book
100 Na9e6298363174569993d813943e8a7c8 rdf:first sg:person.013561353723.05
101 rdf:rest Nfd679d49c6ba4f0da476fea8907c6bcc
102 Nd15d9319e00240d49b413c4126a3a554 schema:name dimensions_id
103 schema:value pub.1004099010
104 rdf:type schema:PropertyValue
105 Nd8245ed76b644ecf849259cce22119a3 schema:familyName Gertz
106 schema:givenName Michael
107 rdf:type schema:Person
108 Nfd679d49c6ba4f0da476fea8907c6bcc rdf:first sg:person.013064616524.13
109 rdf:rest N13e7ff36b6ac4c3582a4e6d729fab919
110 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
111 schema:name Information and Computing Sciences
112 rdf:type schema:DefinedTerm
113 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
114 schema:name Information Systems
115 rdf:type schema:DefinedTerm
116 sg:person.010474304203.39 schema:affiliation grid-institutes:grid.4708.b
117 schema:familyName Ardagna
118 schema:givenName C.A.
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010474304203.39
120 rdf:type schema:Person
121 sg:person.013064616524.13 schema:affiliation grid-institutes:grid.4708.b
122 schema:familyName Vimercati
123 schema:givenName S. De Capitani di
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013064616524.13
125 rdf:type schema:Person
126 sg:person.013561353723.05 schema:affiliation grid-institutes:grid.4708.b
127 schema:familyName Cremonini
128 schema:givenName M.
129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013561353723.05
130 rdf:type schema:Person
131 sg:person.014155725052.10 schema:affiliation grid-institutes:grid.4708.b
132 schema:familyName Samarati
133 schema:givenName P.
134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014155725052.10
135 rdf:type schema:Person
136 grid-institutes:grid.4708.b schema:alternateName Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, 26013 Crema, Italy
137 schema:name Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, 26013 Crema, Italy
138 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...