Integrated Access Control for Smart Buildings using Building Information Models

[1]  Fernando Lyardet,et al.  Context-Aware Indoor Navigation , 2008, AmI.

[2]  Cecilia Mascolo,et al.  Integrating security and usability into the requirements and design process , 2007, Int. J. Electron. Secur. Digit. Forensics.

[3]  Vishal Singh,et al.  BIM adoption : expectations across disciplines , 2010 .

[4]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[5]  Dennis G. Kafura,et al.  First experiences using XACML for access control in distributed systems , 2003, XMLSEC '03.

[6]  Robert W. Reeder,et al.  Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..

[7]  B. Beal Vendor Analysis: IT security: the product vendor landscape , 2005 .

[8]  Sabrina De Capitani di Vimercati,et al.  A modular approach to composing access control policies , 2000, CCS.

[9]  Charles M. Eastman,et al.  Automatic rule-based checking of building designs , 2009 .

[10]  Shamik Sural,et al.  STARBAC: Spatio temporal Role Based Access C ontrol , 2007, OTM Conferences.

[11]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.

[12]  Ed Dawson,et al.  Physical Access Control Administration Using Building Information Models , 2012, CSS.

[13]  Arno Schlueter,et al.  Building information model based energy/exergy performance assessment in early design stages , 2009 .

[14]  Jean-Claude Thill,et al.  Object-Oriented Data Modeling of an Indoor/Outdoor Urban Transportation Network and Route Planning Analysis , 2010 .

[15]  Anthony M. Townsend,et al.  Convergence of Physical and Logical Security: A Pre-implementation Checklist , 2008 .

[16]  Elisa Bertino,et al.  Spatial Domains for the Administration of Location-based Access Control Policies , 2008, Journal of Network and Systems Management.

[17]  Andrew V. Goldberg,et al.  Computing the shortest path: A search meets graph theory , 2005, SODA '05.

[18]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[19]  Erol Gelenbe,et al.  Distributed Building Evacuation Simulator for Smart Emergency Management , 2010, Comput. J..

[20]  H. S. Chandrashekar,et al.  Packet sniffing: a brief introduction , 2003 .

[21]  Robin Drogemuller,et al.  Towards sustainable facilities management , 2009 .

[22]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.

[23]  Marcia Kilchenman O'Malley,et al.  Virtual Testing for Smart Buildings , 2012, 2012 Eighth International Conference on Intelligent Environments.

[24]  Vijayalakshmi Atluri,et al.  An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.

[25]  Elisa Bertino,et al.  Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[26]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[27]  P. I-Hai Lin,et al.  Internet-based monitoring and controls for HVAC applications , 2002 .

[28]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[29]  Andrew S. Patrick,et al.  HCI and security systems , 2003, CHI Extended Abstracts.

[30]  Eduardo B. Fernández,et al.  Security Patterns for Physical Access Control Systems , 2007, DBSec.

[31]  Manachai Toahchoodee,et al.  A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.

[32]  William D. Davis,et al.  Building Tactical Information System for Public Safety Officials. Intelligent Building Response (iBR). | NIST , 2006 .

[33]  Bilal Succar,et al.  Building information modelling framework: A research and delivery foundation for industry stakeholders , 2009 .

[34]  Robin Drogemuller,et al.  Automated code checking and accessibility , 2006 .

[35]  Manachai Toahchoodee,et al.  A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications , 2008, TrustBus.

[36]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[37]  Shamik Sural,et al.  Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..

[38]  James A. Hendler,et al.  Analyzing web access control policies , 2007, WWW '07.

[39]  Thomas Becker,et al.  Requirements and Space-Event Modeling for Indoor Navigation - How to simultaneously address route planning, multiple localization methods, navigation contexts, and different locomotion types , 2010 .

[40]  Erol Gelenbe,et al.  Intelligent Navigation Systems for Building Evacuation , 2011, ISCIS.

[41]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[42]  Ricardo Jardim-Goncalves,et al.  Challenging electronic procurement in the AEC sector: A BIM-based integrated perspective , 2011 .

[43]  Andreas Matheus,et al.  Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure , 2005, SACMAT '05.

[44]  Mats Lind,et al.  2D vs 3D, implications on spatial memory , 2001, IEEE Symposium on Information Visualization, 2001. INFOVIS 2001..

[45]  Brian T. Contos,et al.  Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management , 2007 .

[46]  Jan Kleissl,et al.  Cyber-physical energy systems: Focus on smart buildings , 2010, Design Automation Conference.

[47]  David W. Chadwick,et al.  ‘ R-Whatq ’ Development of a role-based access control policy-writing tool for e-Scientists: Research Articles , 2005 .

[48]  Michael F. Worboys,et al.  Modeling indoor space , 2011, ISA '11.

[49]  R. Ireland,et al.  Inside the new organization: a blueprint for surviving restructuring, downsizing, acquisitions and outsourcing , 2005 .

[50]  Angela Lee,et al.  An IFC‐based space analysis for building accessibility layout for all users , 2004 .

[51]  Konstantin Beznosov,et al.  Towards understanding IT security professionals and their tools , 2007, SOUPS '07.

[52]  Robin Drogemuller,et al.  An Authorization Framework using Building Information Models , 2012, Comput. J..

[53]  Elisa Bertino,et al.  A discretionary access control model with temporal authorizations , 1994, Proceedings New Security Paradigms Workshop.

[54]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[55]  Diana K. Smetters,et al.  In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.

[56]  Ki-Joune Li,et al.  Indoor Space: A New Notion of Space , 2008, W2GIS.

[57]  Edgar-Philipp Stoffel,et al.  Applying hierarchical graphs to pedestrian indoor navigation , 2008, GIS '08.

[58]  Sharath Pankanti,et al.  An identity-authentication system using fingerprints , 1997, Proc. IEEE.

[59]  Jan M. Herrmann Administration of (Geo)XACML policies for spatial data infrastructures , 2011, SPRINGL '11.

[60]  J. Reason Human error: models and management , 2000, BMJ : British Medical Journal.

[61]  Thomas H. Kolbe,et al.  Conceptual Requirements for the Automatic Reconstruction of Building Information Models from Uninterpreted 3D Models , 2009 .

[62]  Erol Gelenbe,et al.  A distributed decision support system for Building Evacuation , 2009, 2009 2nd Conference on Human System Interactions.

[63]  Simon N. Foley,et al.  Anomaly analysis for Physical Access Control security configuration , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[64]  Uwe Rueppel,et al.  BIM-Based Indoor-Emergency-Navigation-System for Complex Buildings , 2008 .

[65]  Elisa Bertino,et al.  An access control model supporting periodicity constraints and temporal reasoning , 1998, TODS.

[66]  Mike Rothery,et al.  Critical Infrastructure Protection and the Role of Emergency Services , 2005 .

[67]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[68]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[69]  Elisa Bertino,et al.  A Temporal Access Control Mechanism for Database Systems , 1996, IEEE Trans. Knowl. Data Eng..

[70]  Xiaoyang Sean Wang,et al.  Authorization in trust management: Features and foundations , 2008, CSUR.

[71]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[72]  Stuart Kent,et al.  Model Driven Engineering , 2002, IFM.

[73]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[74]  Emil C. Lupu,et al.  Security and management policy specification , 2002, IEEE Netw..

[75]  Robin Drogemuller,et al.  Flexible airport terminal design : towards a framework , 2012 .

[76]  Messaoud Benantar,et al.  Access Control Systems: Security, Identity Management and Trust Models , 2005 .

[77]  Nan Li,et al.  Application Areas and Data Requirements for BIM-Enabled Facilities Management , 2012 .

[78]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[79]  Maria Luisa Damiani,et al.  Towards movement-aware access control , 2008, SPRINGL '08.

[80]  Lujo Bauer,et al.  Real life challenges in access-control management , 2009, CHI.

[81]  Simson L. Garfinkel,et al.  Design principles and patterns for computer systems that are simultaneously secure and usable , 2005 .

[82]  Han Chen,et al.  The Design and Implementation of a Smart Building Control System , 2009, 2009 IEEE International Conference on e-Business Engineering.

[83]  David W. Chadwick,et al.  Expressions of expertness: the virtuous circle of natural language for access control policy specification , 2008, SOUPS '08.

[84]  Xiangyu Wang,et al.  A theoretical framework of a BIM-based multi-disciplinary collaboration platform , 2011 .

[85]  Hannu Penttilä,et al.  Describing the changes in architectural information technology to understand design complexity and free-form architectural expression , 2006, J. Inf. Technol. Constr..

[86]  Erol Gelenbe,et al.  Simulating Autonomous Agents with augmented Reality , 2001, GAME-ON.

[87]  Alejandro Metke-Jimenez,et al.  Design of a model-generated repository as a service for USDL , 2010, iiWAS.

[88]  Mustaque Ahamad,et al.  Generalized Role-Based Access Control for Securing Future Applications , 2000 .

[89]  Bin Chen,et al.  Using SAML Callout to Realize Access Restriction for Geospatial Grid Services , 2008, 2008 Seventh International Conference on Grid and Cooperative Computing.