TY - GEN
T1 - Efficient security policy enforcement in a location based service environment
AU - Atluri, Vijayalakshmi
AU - Shin, Heechang
PY - 2007
Y1 - 2007
N2 - Location based services, one of the promising markets of mobile commerce, aims at delivering point of need personalized information. Often, these services to be delivered are based on the prior knowledge of the profiles of mobile customers and security and privacy policies dictated by them. These policies may specify revealing the sensitive information of mobile customers (e.g., age, salary) selectively to specific merchants in return of receiving certain benefits (e.g., coupons, special discounts, etc.). As a result, the security policies in such an environment are characterized by spatial and temporal attributes of the mobile customers (location and time), as well as their profile attributes. The focus of this paper is to efficiently enforce such policies. In this regard, we propose a unified structure that is capable of indexing mobile customer (mobile object) locations and their profiles, and the authorizations stating their security and privacy policies.
AB - Location based services, one of the promising markets of mobile commerce, aims at delivering point of need personalized information. Often, these services to be delivered are based on the prior knowledge of the profiles of mobile customers and security and privacy policies dictated by them. These policies may specify revealing the sensitive information of mobile customers (e.g., age, salary) selectively to specific merchants in return of receiving certain benefits (e.g., coupons, special discounts, etc.). As a result, the security policies in such an environment are characterized by spatial and temporal attributes of the mobile customers (location and time), as well as their profile attributes. The focus of this paper is to efficiently enforce such policies. In this regard, we propose a unified structure that is capable of indexing mobile customer (mobile object) locations and their profiles, and the authorizations stating their security and privacy policies.
UR - http://www.scopus.com/inward/record.url?scp=37849053407&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=37849053407&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-73538-0_5
DO - 10.1007/978-3-540-73538-0_5
M3 - Conference contribution
AN - SCOPUS:37849053407
SN - 9783540735335
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 61
EP - 76
BT - Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
A2 - Barker, Steve
A2 - Ahn, Gail-Joon
PB - Springer Verlag
T2 - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSEC
Y2 - 8 July 2007 through 11 July 2007
ER -