Abstract | ||
---|---|---|
Intelligent computing capabilities are gradually being entrenched into physical spaces, thereby clouding the boundaries between physical and cyber spaces. To date, physically-enabled cyber-attacks have not fully been addressed in cyber space, due to a limitation on available technology. When a sensitive spreadsheet is printed, it leaves the protection of the logical space, and is only protected by security mechanisms of the physical space in which it is located. To provide better protection, a virtual perimeter can be formed around such a document, using location and topology-aware technologies. Making security mechanisms more location and topology-aware requires the investigation of a range of security relevant characteristics and their possible representations. To date, not much research has been done to address the protection of assets within a virtual perimeter. This research makes a contribution by evaluating a number of current access control approaches that address the physical and cyber world together, and then proposes a set of access control requirements for physical spaces that are protected by virtual perimeters. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1007/978-3-319-98385-1_13 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
Access control,Virtual perimeter,Topology,Location,Depth sensing | Intelligent computing,Computer security,Computer science,Cyber Space,Access control,Physical space | Conference |
Volume | ISSN | Citations |
11033 | 0302-9743 | 2 |
PageRank | References | Authors |
0.38 | 18 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Brian Greaves | 1 | 3 | 0.75 |
Marijke Coetzee | 2 | 35 | 14.10 |
Wai Sze Leung | 3 | 2 | 0.38 |