Access control requirements for physical spaces protected by virtual perimeters

Brian Greaves, Marijke Coetzee, Wai Sze Leung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)

Abstract

Intelligent computing capabilities are gradually being entrenched into physical spaces, thereby clouding the boundaries between physical and cyber spaces. To date, physically-enabled cyber-attacks have not fully been addressed in cyber space, due to a limitation on available technology. When a sensitive spreadsheet is printed, it leaves the protection of the logical space, and is only protected by security mechanisms of the physical space in which it is located. To provide better protection, a virtual perimeter can be formed around such a document, using location and topology-aware technologies. Making security mechanisms more location and topology-aware requires the investigation of a range of security relevant characteristics and their possible representations. To date, not much research has been done to address the protection of assets within a virtual perimeter. This research makes a contribution by evaluating a number of current access control approaches that address the physical and cyber world together, and then proposes a set of access control requirements for physical spaces that are protected by virtual perimeters.

Original languageEnglish
Title of host publicationTrust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Proceedings
EditorsHaralambos Mouratidis, Steven Furnell, Günther Pernul
PublisherSpringer Verlag
Pages182-197
Number of pages16
ISBN (Print)9783319983844
DOIs
Publication statusPublished - 2018
Event15th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2018 - Regensburg, Germany
Duration: 5 Sept 20186 Sept 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11033 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2018
Country/TerritoryGermany
CityRegensburg
Period5/09/186/09/18

Keywords

  • Access control
  • Depth sensing
  • Location
  • Topology
  • Virtual perimeter

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Access control requirements for physical spaces protected by virtual perimeters'. Together they form a unique fingerprint.

Cite this