Topology-Aware Access Control of Smart Spaces

Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization tool allows security analysts to edit space topology and verify that access-control policies meet security requirements.

[1]  Tele Tan,et al.  Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM , 2014 .

[2]  Xia Zhao,et al.  Access Governance: Flexibility with Escalation and Audit , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[3]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[4]  Carlo Ghezzi,et al.  On the Interplay Between Cyber and Physical Spaces for Adaptive Security , 2018, IEEE Transactions on Dependable and Secure Computing.

[5]  Carlo Ghezzi,et al.  Topology aware adaptive security , 2014, SEAMS 2014.

[6]  Charles M. Eastman,et al.  BIM Handbook: A Guide to Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors , 2008 .

[7]  Amin Hammad,et al.  Improving Indoor Security Surveillance by Fusing Data from BIM, UWB and Video , 2013 .

[8]  Carlo Ghezzi,et al.  Adding Static and Dynamic Semantics to Building Information Models , 2016, 2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).

[9]  Shang-Hsien Hsieh,et al.  Visualization of CCTV coverage in public building space using BIM technology , 2013 .

[10]  David F. Ferraiolo,et al.  Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .

[11]  Gail-Joon Ahn,et al.  Anomaly discovery and resolution in web access control policies , 2011, SACMAT '11.

[12]  Sri Lanka,et al.  Integrated Access Control for Smart Buildings using Building Information Models , 2014 .

[13]  Simon N. Foley,et al.  Anomaly analysis for Physical Access Control security configuration , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[14]  Tevfik Bultan,et al.  Automated verification of access control policies using a SAT solver , 2008, International Journal on Software Tools for Technology Transfer.