Reference Hub1
Role-Based Access Control for Mobile Computing and Applications

Role-Based Access Control for Mobile Computing and Applications

Yaira K. Rivera Sánchez, Steven A. Demurjian, Joanne Conover, Thomas P. Agresta, Xian Shao, Michael Diamond
ISBN13: 9781799804178|ISBN10: 1799804178|EISBN13: 9781799804185
DOI: 10.4018/978-1-7998-0417-8.ch013
Cite Chapter Cite Chapter

MLA

Sánchez, Yaira K. Rivera, et al. "Role-Based Access Control for Mobile Computing and Applications." Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice, edited by Information Resources Management Association, IGI Global, 2020, pp. 253-276. https://doi.org/10.4018/978-1-7998-0417-8.ch013

APA

Sánchez, Y. K., Demurjian, S. A., Conover, J., Agresta, T. P., Shao, X., & Diamond, M. (2020). Role-Based Access Control for Mobile Computing and Applications. In I. Management Association (Ed.), Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice (pp. 253-276). IGI Global. https://doi.org/10.4018/978-1-7998-0417-8.ch013

Chicago

Sánchez, Yaira K. Rivera, et al. "Role-Based Access Control for Mobile Computing and Applications." In Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice, edited by Information Resources Management Association, 253-276. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-0417-8.ch013

Export Reference

Mendeley
Favorite

Abstract

The proliferation of mobile devices has changed the way that individuals access digital information with desktop applications now performed seamlessly in mobile applications. Mobile applications related to healthcare, finance/banking, etc., have highly sensitive data where unsecure access could have serious consequences. This chapter demonstrates an approach to Role-Based Access Control (RBAC) for mobile applications that allows an information owner to define who can do what by role, which is then enforced within a mobile application's infrastructure (UI, API, server/database). Towards this objective, the chapter: motivates the usage of RBAC for mobile applications; generalizes the structure and components of a mobile application so that it can be customized by role; defines a configurable framework of locations where RBAC can be realized in a mobile application's infrastructure; and, proposes an approach that realizes RBAC for mobile security. To demonstrate, the proposed RBAC approach is incorporated into the Connecticut Concussion Tracker mobile application.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.