Location-based access control maintains user privacy, as a person's location, not her identity, is used to provide access. It simplifies the management of authentication information by relying on a limited set of authorized locations, rather than thousands of authorized IDs. It also links physical access control to resource control. If authentication is already required for physical access, location-based resource access control removes duplication of authentication.Our architecture is unique in that it provides a reliable method of bounding a user's location, even in the face of attempted location spoofing, while protecting critical communication from eavesdropping.
|Original language||English (US)|
|State||Published - Jul 14 2005|