O'Reilly logo

Location-Based Services Handbook by Mohammad Ilyas, Syed A. Ahson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Location-Aware Access Control: Scenarios Modeling Approaches, and Selected Issue

Michael Decker

7.1 Introduction

“Access control is the process of mediating every request to resources and data maintained by a[n information] system and determining whether the request should be granted or denied” (Di Vimercati, Paraboschi and Samarati 2003). More formally, this can be expressed as follows:

isAccessAllowed(Subject, Object, Operation) → {true, false}

The parameters of the function isAccessAllowed() have the following meaning:

  • “Subject” is an authenticated user of the information system or a computer program working on behalf of a human user. More advanced access control systems will also support “groups,” which are collections of subjects, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required