Lecture Notes in Computer Science 5185
Lecture Notes in Computer Science 5185
Lecture Notes in Computer Science 5185
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Spatiotemporal Connectives for Security Policy 119<br />
Several attempts have been made to formally specify time and space [1]. The<br />
different approaches by different parties have already raised the <strong>in</strong>ter operability<br />
issue. Standard bodies have been formed so that all can work together for a<br />
common format [2]. Nonetheless, till now the aspect of representation of space<br />
and time <strong>in</strong>teract<strong>in</strong>g with each other has got less attention <strong>in</strong> exist<strong>in</strong>g security<br />
policy literature. On the other hand, we believe that occurrence of an event is<br />
what is fundamentally relevant to any access control system. Any event normally<br />
takes place at precise time and space po<strong>in</strong>ts. So a formalism for space and time is<br />
necessary. Abstract representation of space and time <strong>in</strong> mathematics (especially<br />
<strong>in</strong> Geometry) is well known. However, a similar abstract representation makes<br />
the job of writ<strong>in</strong>g spatiotemporal events quite difficult. So what we need is a<br />
representation which uses natural language keywords for represent<strong>in</strong>g these two<br />
<strong>in</strong>terrelated dimensions. At the same time, we should be careful that such a<br />
representation does not leave any ambiguity that occurs frequently <strong>in</strong> the use of<br />
natural language. In this paper we present an approach for formaliz<strong>in</strong>g space time<br />
<strong>in</strong>teraction us<strong>in</strong>g spatiotemporal connectives evolved from natural phenomena.<br />
In do<strong>in</strong>g so we have modeled spatial objects hierarchically related to each other.<br />
We discuss related work done <strong>in</strong> this area <strong>in</strong> the next section. Then we expla<strong>in</strong><br />
the notion of space time <strong>in</strong>teraction <strong>in</strong> Section3.InSection4,weputourspace<br />
time formalism <strong>in</strong> place. Section 5 presents the proposed policy connectives <strong>in</strong><br />
detail. Some examples of requirements <strong>in</strong> access control have been expressed<br />
us<strong>in</strong>g our specification <strong>in</strong> Section 6 and we conclude <strong>in</strong> Section 7.<br />
2 Related Work<br />
Niezette and Stevenne [1] po<strong>in</strong>ted out that stor<strong>in</strong>g and handl<strong>in</strong>g of temporal<br />
<strong>in</strong>formation has been a topic of <strong>in</strong>terest <strong>in</strong> database technology for many years.<br />
The earlier models could not handle the <strong>in</strong>f<strong>in</strong>ite nature of time properly. Without<br />
prior knowledge of upper and lower bounds, stor<strong>in</strong>g <strong>in</strong>formation <strong>in</strong> a database<br />
which repeats, say every month, was difficult or it used to consume a large<br />
amount of space. The concept of generalized database by Kabanza et al. [3]<br />
first proposed l<strong>in</strong>ear repeat<strong>in</strong>g po<strong>in</strong>t for f<strong>in</strong>ite representation of <strong>in</strong>f<strong>in</strong>ite temporal<br />
data. A generalized tuple represents a possibly <strong>in</strong>f<strong>in</strong>ite set of classical tuples. The<br />
symbolic representation of periodic time was proposed by Niezette and Stevenne<br />
[1]. This representation uses a natural calender for express<strong>in</strong>g periodic time and<br />
was found to be very useful <strong>in</strong> the context of express<strong>in</strong>g access requirements.<br />
Based on this symbolism, Bert<strong>in</strong>o et al. [4] proposed a temporal authorization<br />
system for databases. The same symbolism was subsequently found suitable for<br />
express<strong>in</strong>g temporal constra<strong>in</strong>ts for Role Based Access Control model [5].<br />
For formaliz<strong>in</strong>g spatial entities, there is an open standard group of body called<br />
Open Geospatial Consortium (OGC) [2]. OGC recognizes features as the core<br />
component for captur<strong>in</strong>g geographic objects of <strong>in</strong>terest [6]. There is another set<br />
of documents related to implementation of OGC features which is based on<br />
the abstract specification. Such a standard body formalizes the representation<br />
of spatial objects. On the other hand, the recent access control models already