Intelligent computing capabilities are gradually being entrenched into physical spaces, thereby clouding the boundaries between physical and cyber spaces. To date, physically-enabled cyber-attacks have not fully been addressed in cyber space, due to a limitation on available technology. When a sensitive spreadsheet is printed, it leaves the protection of the logical space, and is only protected by security mechanisms of the physical space in which it is located. To provide better protection, a virtual perimeter can be formed around such a document, using location and topology-aware technologies. Making security mechanisms more location and topology-aware requires the investigation of a range of security relevant characteristics and their possible representations. To date, not much research has been done to address the protection of assets within a virtual perimeter. This research makes a contribution by evaluating a number of current access control approaches that address the physical and cyber world together, and then proposes a set of access control requirements for physical spaces that are protected by virtual perimeters.
CITATION STYLE
Greaves, B., Coetzee, M., & Leung, W. S. (2018). Access control requirements for physical spaces protected by virtual perimeters. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11033 LNCS, pp. 182–197). Springer Verlag. https://doi.org/10.1007/978-3-319-98385-1_13
Mendeley helps you to discover research relevant for your work.