Research Article
Access Control Based on Location and Time
@INPROCEEDINGS{10.1007/978-3-642-32573-1_16, author={Suresh Limkar and Nivedita Kadam and Rakesh Jha}, title={Access Control Based on Location and Time}, proceedings={Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers}, proceedings_a={SPIT \& IPC}, year={2012}, month={10}, keywords={Cryptography Encryption Location based security GPS GSM Biometric}, doi={10.1007/978-3-642-32573-1_16} }
- Suresh Limkar
Nivedita Kadam
Rakesh Jha
Year: 2012
Access Control Based on Location and Time
SPIT & IPC
Springer
DOI: 10.1007/978-3-642-32573-1_16
Abstract
We propose an access control model that works like three factor authentication for getting access to our system. This system takes time and location into account to specify access control policies. We also discuss implementation techniques for location and time based policy specifications and the integration of these policies in standalone applications. This model enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location with predefined time. Moreover this system authenticate authorized user but also time and location of the authorized user in both way i.e through GSM & GPS. The declarative nature of the model facilitates the analysis of policies and the evaluation of access requests: we present one case-study for clear understanding. This paper shows how computer and network security can be substantially improved through a new form of authentication based on geodetic location parameter received from GPS/ GSM along with the constraint of time.