Similar publications

Article
Full-text available
This paper describes hybrid access control system based on a new approach of face recognition and PIN (Personal Identification Number) code identification, which is done by finding the closest match between features implemented on the same databases. This approach involves two identification and matching subsystems. The outputs from these subsystem...
Preprint
Full-text available
Step & Turn is a novel bimodal behavioral biometric-based verification scheme for physical access control. In today's rapidly evolving smart physical spaces, frictionless and smooth interactions are emerging as critical usability requirements. Such demands need to coexist with mandatory requirements like security. Step & Turn addresses the fundamen...
Article
Full-text available
This work proposes a new finger-vein recognition system that uses a binary robust invariant elementary feature from accelerated segment test feature points and an adaptive thresholding strategy. Subsequently, the proposed a Multiimage Quality Assessments (MQA) are applied to conduct a second stage verification. As oppose to other studies, the Regio...
Chapter
Full-text available
Biometric based attributes are the latest additions to the existing mechanisms used for security of information system and for access control. Among a host of others, face recognition is the most effective biometric system for identification and verification of persons. Face recognition from video has gained attention due to its popularity and ease...
Article
Full-text available
Hand and finger geometry recognition is the process of identifying an individual through the unique "geometry" (shape, thickness, length, width, etc.) of that individual's hand. Hand geometry recognition systems can be used in several different types of applications, including access control and time and attendance tracking, while time and attendan...

Citations

... The Generalized Spatiotemporal Role Based Access Control model was proposed by [60]. Physical and logical access control are both possible in the model. ...
Article
Full-text available
After the emergence of the Coronavirus disease (Covid19) in December, 2019 the virus was confirmed by the World Health Organization (WHO) to be a dangerous virus that spread through airborne and droplets. One of the most effective way of preventing the spread of this virus is the use of facemask in public places such as banks, shopping mall, schools, offices and the likes. For this reasons people are advised to use facemask whenever they go out for their daily activities. However, some people have refused to wear the facemask in public places, thereby increasing the rate at which the virus spreads. Hence, there is a need to design an access control system for use in public places to grant access to people complying with the facemask regulations or deny access to those faulting them. Literature has shown that the use of computer vision and deep learning technology can play important role in the deployment of such access control system for face detection and facemask detection. The computer vision and deep learning techniques used in face recognition and facemask detection are describes in this systematic literature review.
... Accordingly, suitable policy aggregation and policy deconflictation/reconciliation mechanisms must be employed during this step to support the policy administrators. To this end, a number of policy verification and validation frameworks have been proposed in the literature [51][52][53][54] and can be exploited in order to eliminate any mistakes and misconfigurations. As a final point, it is worth mentioning that the policy specification cannot be considered as a static procedure. ...
Article
Full-text available
The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices in terms of power, computational capacity and storage, require an effective and efficient access control mechanism to be in place to provide suitable monitoring and control of actions and regulate the access over the resources. In this article, we present RESPOnSE, a framework for the specification and enforcement of security policies within such environments, where the computational burden is transferred to high-tier nodes, while low-tier nodes apply risk-aware policy enforcement. RESPOnSE builds on a combination of two widely used access control models, Attribute-Based Access Control and Role-Based Access Control, exploiting the benefits each one provides. Moreover, the proposed mechanism is founded on a compensatory multicriteria decision-making algorithm, based on the calculation of the Euclidean distance between the run-time values of the attributes present in the security policy and their ideal values, as those are specified within the established policy rules.
... Alloy is a modeling language capable of expressing complex structural constraints and behavior. It has been used to specify network protocols [9][10][11][12] and security polices [13][14][15]. It has very good tool support in the form of the Alloy Analyzer that translates an Alloy specification into a Boolean formula that is evaluated by embedded SAT-solvers. ...
... Alloy has been used to check network protocols [9][10][11][12] and access control polices [13][14][15]. Zave et al. [9][10][11] used Alloy to analyze a variety of network protocols (e.g., Chord protocol). Arye et al. [12] proposed an Alloy model for analyzing the stability properties of the Border Gateway Protocol (BGP). ...
... Schaad et al. [13] used Alloy to formally analyze role-based access control policies. Samuel et al. [14] proposed a framework for specifying and verifying generalized spatio-temporal role-based access control model using Alloy. Toahchoodee et al. [15] used Alloy to analyze a spatio-temporal access control model that supports delegation. ...
Article
The electronic Personal Health Records (PHRs) such as medical history, lab reports, and insurance are stored in systems such as Microsoft Health Vault where a medical care provider or a patient is responsible for uploading and managing the health information. Storing PHRs in such a manner prohibits the patients from having complete control over their data and also may make the PHR system the target of security attacks. Towards this end, we proposed a new architecture, namely Personal Data Server overlay, where the data is stored on a set of Secure Portable Tokens (SPTs) that are under the control of individual users. SPTs are cheap, portable, and secure devices that combine the computing power and tamper-resistant properties of the smart cards and the storage capacity of NAND flash memory chips and they can act as a Personal Data Server (PDS). We need formal assurance of data availability when information is stored in PDS overlays. Thus, data must be replicated at multiple PDSs. We propose a data replication protocol that ensures that the PHRs for each user has replicas in the PDS overlay. It is crucial to ensure correctness of the data replication protocol. Consequently, we formalize the protocol using the Unified Modeling Language (UML) and specify a number of desirable properties. We need to provide formal assurance of these properties in an automated manner. We demonstrate how the UML model can be transformed into Alloy using the UML-to-Alloy transformations. This obviates the need for the protocol designer to know Alloy. The analysis uncovers a significant error in the protocol. Uncovering such errors help refine the protocol and ensures its correctness before deployment.
... For example TRBAC [18] activates user roles at certain time periods and LRBAC [27] controls user privileges based on her physical location. There are similar works [24,29,32,28] where user's role gets activated based on location or time of user requesting access to resource. However they don't consider the space and time attributes of datasets to define spatio-temporal access control. ...
Article
Full-text available
Cities are a big source of spatio-temporal data that is shared across entities to drive potential use cases. Many of the Spatio-temporal datasets are confidential and are selectively shared. To allow selective sharing, several access control models exist, however user cannot express arbitrary space and time constraints on data attributes using them. In this paper we focus on spatio-temporal access control model. We show that location and time attributes of data may decide its confidentiality via a motivating example and thus can affect user's access control policy. In this paper, we present StreetX which enables user to represent constraints on multiple arbitrary space regions and time windows using a simple abstract language. StreetX is scalable and is designed to handle large amount of spatio-temporal data from multiple users. Multiple space and time constraints can affect performance of the query and may also result in conflicts. StreetX automatically resolve conflicts and optimizes the query evaluation with access control to improve performance. We implemented and tested prototype of StreetX using space constraints by defining region having 1749 polygon coordinates on 10 million data records. Our testing shows that StreetX extends the current access control with spatio-temporal capabilities.
... The architecture consists of four components and several databases. To deal with the context requirements and to address heterogeneity challenge related to privacy and security of complex systems, we use a Generalized Spatio-temporal Role Based Access Control (GST-RBAC) model [Sam07]. GST-RBAC uses the basic RBAC model by taking into account the environmental contexts, such as location and time to provide a comprehensive and generalized approach to security and privacy management. ...
... The GST-RBAC model allows specification of spatial and temporal constraints on role enabling, user-role assignment, temporal constraints on role enabling, user-role assignment, and role-permission assignments, activation, runtime events, constraint enabling expressions and triggers as mentioned in detail in [Jos05]. Further details of GST-RBAC model along with temporal and spatial constraints can be found in [Sam07]. We now describe the high-level functions of Fig. 3 and then discuss the functionality of the components in later sections. ...
... In this section we present an example of an XML-based Generalized Spatio Temporal Role Based Access Control (X-GSTRABC) policy. [Bha05,Sam07]. X-GSTRBAC, uses XML-based policy specification language, and is an extension of the RBAC model suitable for addressing the access management challenges in federated systems. ...
Article
Full-text available
Security and privacy of complex systems is a concern due to proliferation of cyber based technologies. Several researchers have pointed out that for the proper enforcement of privacy rules in a complex system, the privacy requirements should be captured in access control systems. In this paper, we present a framework for composition and enforcement of context-aware rules for such systems. The focus of this paper is the design of a system to allow a user (not a system or security administrator) to compose conflict free access control policies for his or her on-line assets. An additional requirement in this case is that such a policy be context-aware. We also present a methodology for verifying the privacy rules to ensure correctness and logical consistency. The verification process is also used to ensure that sensitive security requirements are not violated when privacy rules are enforced.
... It has been found that most of the recent work focuses on modeling and analysis of the cyber access control system [1], [2], [3], [4], [9]. In order to meet the requirements of such systems, several access control models have been proposed such as Role Based Access Control (RBAC) [8] and Spatio-Temporal Role Based Access Control (STRBAC) [9]. ...
... It is therefore essential to perform an analysis of STRBAC models to identify inconsistencies in the specification. As a result, lots of work have been presented to identify such inconsistencies using secondary modeling language [3], [17], [19]. Alloy which is a SAT-solver based has been used for analysis of Access control specification. ...
... Secondly, the increase in the size of organisation has increased the complexity and the size of access control systems, as a result, this has the demand of finding an automated tool for the analysis of access control specification. Alloy [5] which is a SAT-solver based has been used for analysis of the specification of cyber access control system [3], [4], [8] [16]. In contrast with the most recent works, our approach make the use of Alloy for analysis of the specification of physical access control. ...
Article
Full-text available
Spatio-Temporal Role-based access control (STRBAC) has been acknowledged as an effective mechanism for specifying access control policies for cyber systems. However, it is not yet clear how a STR-BAC model can be used for specifying access control policies for physical systems. In this paper, we propose a Spatio-Temporal Role Based Access Control (STRBAC) system for modeling the physical access control specification. However, any comprehensive access control model such as STRBAC requires verification mechanisms to ensure the consistency of access control specification. As a result, this paper makes the use of Alloy to perform the analysis of the STRBAC specification. To achieve this, the paper make the use of AC2Alloy to automate the transformation between STRBAC specification and Alloy. With the help of an example, this paper shows how the STRBAC model is transformed into Alloy using our AC2Alloy, and then the produced Alloy model will be analyzed using Alloy Analyzer to detect inconsistencies in the STRBAC specification.. Index Terms-spatio-temporal role based access control, alloy, ac2alloy, physical system.
... Malheureusement, nous n'avons pas encore trouvé d'étude consacrée à la vérification de la préservation de la propriété de cohérence par TMAC et ses dérivées, si ces derniers devraient être déployés dans un cadre comme celui-ci. Aussi, bien qu'il existe plusieurs études telles que (Abdunabi et al., 2013 ;Toahchoodee et al., 2009 ;Hu, Ahn, 2008 ;Samuel et al., 2007), relatives à la satisfaction de certaines propriétés par RBAC et quelques-unes de ses variantes, très peu de travaux sont consacrés à un contexte comme celui des éditeurs collaboratifs répartis ou à un contexte similiaire comme le workflow. Dans (Sbaï, Barkaoui, 2013), les auteurs ont procédé à la vérification formelle des processus workflow collaboratifs en utilisant l'outil SPIN (Holzmann, 2004). ...
... The formalism used to describe a model does not need to be the same as that used in actual decision making. For example, GSTRBAC [41] uses set theory to define the model and predicate logic to define access policies and implement authorisation decision making. ...
... GSTRBAC is a formal framework for specification and verification of spatiotemporal role-based access control proposed by Samuel, Ghafoor and Bertino [41]. It incorporates topological spatial constraints to the existing GTRBAC model [64]. ...
Article
Full-text available
A building information model (BIM) is an electronic repository of structured, three-dimensional data that captures both the physical and dynamic functional characteristics of a facility. In addition to its more traditional function as a tool to aid design and construction, a BIM can be used throughout the life cycle of a facility, functioning as a living database that places resources contained within the building in their spatial and temporal context. Through its comprehension of spatial relationships, a BIM can meaningfully represent and integrate previously isolated control and management systems and processes, and thereby provide a more intuitive interface to users. By placing processes in a spatial context, decision-making can be improved, with positive flow-on effects for security and efficiency. In this article, we systematically analyse the authorization requirements involved in the use of BIMs. We introduce the concept of using a BIM as a graphical tool to support spatial access control configuration and management (including physical access control). We also consider authorization requirements for regulating access to the structured data that exists within a BIM as well as to external systems and data repositories that can be accessed via the BIM interface. With a view to addressing these requirements we present a survey of relevant spatiotemporal access control models, focusing on features applicable to BIMs and highlighting capability gaps. Finally, we present a conceptual authorization framework that utilizes BIMs.
... Some works consider role transition from temporal and spatial perspective [16,17,18] [20]. In particular, the model allows expressing periodic as well as duration constraints on roles, user-role assignments, and role-permission assignments. ...
Article
Full-text available
The advent of smartphones in recent years has changed the wireless landscape. Smartphones have become a platform for online user interface to cloud databases. Cloud databases may provide a large set of user-private and sensitive data (i.e., objects), while smartphone users (i.e., subjects) provide location-sensitive information. Secure and private services in wireless accessing to cloud databases have been discussed actively for the past recent years. However, the previous techniques are unsatisfactory for dynamism of moving subjects' wireless accesses. In this paper, we propose a novel technique to dynamically generate virtual private databases (VPD) for each access by taking subjects' location and time information into account. The contribution of this paper includes a privacy-preserving access control mechanism for dynamism of wireless access.
... There are UML research tools that support behavioral analysis (e.g., [7]), but these tools are either based on specialized forms of UML models that developers must become familiar with in order to use effectively, or require developers to use behavioral models such as statemachines to specify their properties, even when the properties can be more conveniently expressed as class models. Alloy [6] is a formal specification language that has been used to specify security policies (e.g., see [14] [12]). It has very good tool support in the form of the Alloy Analyzer that translates an Alloy specification into a boolean formula that is evaluated by embedded SAT-solvers. ...
... There are UML research tools that support behavioral analysis (e.g.,[7]), but these tools are either based on specialized forms of UML models that developers must become familiar with in order to use effectively, or require developers to use behavioral models such as statemachines to specify their properties, even when the properties can be more conveniently expressed as class models. Alloy[6]is a formal specification language that has been used to specify security policies (e.g., see[14][12]). It has very good tool support in the form of the Alloy Analyzer that translates an Alloy specification into a boolean formula that is evaluated by embedded SAT-solvers. ...
... al.[14]used Alloy to formally analyze rolebased access control policies. Samuel et. al.[12]proposed a framework for specification and verification of generalized spatio-temporal role-based access control model using Alloy. However, Alloy requires a user to have a good background in relational logic. ...
Conference Paper
Full-text available
The use of the Unified Modeling Language (UML)for specifying security policies is attractive because it is expressive and has a wide user base in the software industry. However, there are very few mature tools that support rigorous analysis of UML models. Alloy is a formal specification language that has been used to rigorously analyze security policies, but few practitioners have the background needed to develop good Alloy models. We propose a new approach to policy analysis in which designers use UML at the front-end to describe their security policies and the Alloy Analyzer is used at the backend to analyze the modeled properties. The UML-to-Alloy and Alloy-to-UML transformations obviate the need for security designers to understand the Alloy specification language. The proposed approach supports the analysis of both functional and structural aspects of security policies.