{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:41:20Z","timestamp":1760488880357,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["No. 2016YFC0702107"],"award-info":[{"award-number":["No. 2016YFC0702107"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>A building information model (BIM) is of upmost importance with a full life-time cycle in architecture engineering and construction industry. Smart construction relies on BIM to manipulate information flow, data flow, and management flow. Currently, BIM has been explored mainly for information construction and utilization, but there exist few works concerning information security, e.g., audits of critical models and exposure of sensitive models. Moreover, few BIM systems have been proposed to make use of new computing paradigms, such as mobile cloud computing, blockchain and Internet of Things. In this paper, we propose a Context-aware Access Control (CaAC) model for BIM systems on mobile cloud architectures. BIM data can be confidentially accessed according to contexts in a fine-grained manner. We describe functions of CaAC formally by illustrating location-aware access control and time-aware access control. CaAC model can outperform role-based access control for preventing BIM data leakage by distinguishing contexts. In addition, grouping algorithms are also presented for flexibility, in which basic model (user grouping based on user role permissions) and advanced model (user grouping based on user requests) are differentiated. Compared with the traditional role-based access control model, security and feasibility of CaAC are remarkably improved by distinguishing an identical role with multiple contexts. The average efficiency is improved by     2 n \/ ( 2 n \u2212 p \u2212 q )    , and time complexity is     O ( n )    .<\/jats:p>","DOI":"10.3390\/info10020047","type":"journal-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T11:19:58Z","timestamp":1549019998000},"page":"47","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["CaACBIM: A Context-aware Access Control Model for BIM"],"prefix":"10.3390","volume":"10","author":[{"given":"Rongyue","family":"Zheng","sequence":"first","affiliation":[{"name":"Faculty of Architecture, Civil Engineering and Environment, Ningbo University, Ningbo 315211, China"}]},{"given":"Jianlin","family":"Jiang","sequence":"additional","affiliation":[{"name":"Faculty of Architecture, Civil Engineering and Environment, Ningbo University, Ningbo 315211, China"}]},{"given":"Xiaohan","family":"Hao","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8590-1737","authenticated-orcid":false,"given":"Wei","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"}]},{"given":"Feng","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Business Administration, Zhongnan University of Economics and Law, Wuhan 430073, China"}]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"},{"name":"School of Software, University of Technology Sydney, Ultimo, NSW 2007, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.autcon.2012.02.008","article-title":"How to measure the benefits of BIM\u2014A case study approach","volume":"24","author":"Barlish","year":"2012","journal-title":"Autom. Constr."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.autcon.2009.09.003","article-title":"Understanding adoption and use of bim as the creation of actor networks","volume":"19","author":"Linderoth","year":"2010","journal-title":"Autom. Constr."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/j.autcon.2010.07.015","article-title":"Managing construction information using rfid-based semantic contexts","volume":"19","author":"Elghamrawy","year":"2010","journal-title":"Autom. Constr."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.autcon.2012.04.013","article-title":"Design patterns for bim-based service-oriented architectures","volume":"25","author":"Isikdag","year":"2012","journal-title":"Autom. Constr."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1016\/j.autcon.2010.07.017","article-title":"Multisensor data fusion for on-site materials tracking in construction","volume":"19","author":"Razavi","year":"2010","journal-title":"Autom. Constr."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2008.2","article-title":"An rbac implementation and interoperability standard: The incits cyber security 1.1 model","volume":"6","author":"Coyne","year":"2008","journal-title":"IEEE Secur. Priv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MSP.2007.173","article-title":"Rbac standard rationale: Comments on \u201ca critique of the ansi standard on role-based access control\u201d","volume":"5","author":"Ferraiolo","year":"2007","journal-title":"IEEE Secur. Priv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MC.2012.38","article-title":"Role-based access control in retrospect","volume":"45","author":"Franqueira","year":"2012","journal-title":"Computer"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/TSC.2010.27","article-title":"Runtime administration of an rbac profile for xacml","volume":"4","author":"Xu","year":"2011","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1016\/j.jcss.2014.02.006","article-title":"A security framework in G-Hadoop for big data computing across distributed Cloud data centres","volume":"80","author":"Zhao","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCC.2015.78","article-title":"End-to-End Privacy for Open Big Data Markets","volume":"2","author":"Perera","year":"2015","journal-title":"IEEE Cloud Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MITP.2015.34","article-title":"Big Data Privacy in the Internet of Things Era","volume":"17","author":"Perera","year":"2015","journal-title":"IT Prof."},{"key":"ref_13","unstructured":"Ren, Q., Tan, D., and Tan, C. (2011, January 24\u201326). Research of sustainable design based on technology of bim. Proceedings of the 2011 International Conference on Remote Sensing, Environment and Transportation Engineering (RSETE\u201911), Nanjing, China."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yoon, S., Park, N., and Choi, J. (2009, January 25\u201327). A bim-based design method for energy-efficient building. Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC (NCM\u201909), Seoul, Korea.","DOI":"10.1109\/NCM.2009.406"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Vozzola, M., Cangialosi, G., and Turco, M.L. (2009, January 20\u201322). BIM use in the construction process. Proceedings of the International Conference on Management and Service Science (MASS\u201909), Wuhan, China.","DOI":"10.1109\/ICMSS.2009.5305126"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kokorus, M., Eyrich, W., and Zacharias, R. (2016, January 5). Innovative approach to the substation design using Building Information Modeling (BIM) technology. Proceedings of the 2016 IEEE\/PES Transmission and Distribution Conference and Exposition (TD16), Dallas, TX, USA.","DOI":"10.1109\/TDC.2016.7519983"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, X., and Love, P.E. (2012, January 23\u201325). BIM + AR: Onsite information sharing and communication via advanced visualization. Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD\u201912), Wuhan, China.","DOI":"10.1109\/CSCWD.2012.6221920"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Garcia-Fernandez, J., Anssi, J., Ahn, Y., and Fernandez, J.J. (October, January 28). Quantitative + qualitative information for heritage conservation an open science research for paving \u2019collaboratively\u2019 the way to historical-BIM. Proceedings of the 2015 Digital Heritage, Granada, Spain.","DOI":"10.1109\/DigitalHeritage.2015.7419495"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bottaccioli, L., Aliberti, A., Ugliotti, F., Patti, E., Osello, A., Macii, E., and Acquaviva, A. (2017, January 4\u20138). Building Energy Modelling and Monitoring by Integration of IoT Devices and Building Information Models. Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC17), Turin, Italy.","DOI":"10.1109\/COMPSAC.2017.75"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Pasini, D., Ventura, S.M., Rinaldi, S., Bellagente, P., Flammini, A., and Ciribini, A.L.C. (2016, January 12\u201315). Exploiting Internet of Things and building information modeling framework for management of cognitive buildings. Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2\u201916), Trento, Italy.","DOI":"10.1109\/ISC2.2016.7580817"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Desogus, G., Quaquero, E., Sanna, A., Gatto, G., Tagliabue, L.C., Rinaldi, S., Ciribini, A.L.C., Di Giuda, G., and Villa, V. (2017, January 20\u201322). Preliminary performance monitoring plan for energy retrofit: A cognitive building: The \u201cMandolesi Pavillon\u201d at the University of Cagliari. Proceedings of the 2017 AEIT International Annual Conference, Cagliari, Italy.","DOI":"10.23919\/AEIT.2017.8240529"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Arslan, M., Riaz, Z., and Munawar, S. (2017, January 9\u201313). Building Information Modeling (BIM) Enabled Facilities Management Using Hadoop Architecture. Proceedings of the Portland International Conference on Management of Engineering and Technology (PIC MET17), Portland, OR, USA.","DOI":"10.23919\/PICMET.2017.8125462"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yuan, Y., and Jin, Z. (2015, January 20\u201322). Life Cycle Assessment of Building Energy in Big-Data Era: Theory and Framework. Proceedings of the 2015 International Conference on Network and Information Systems for Computers, Wuhan, Beijing.","DOI":"10.1109\/ICNISC.2015.130"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ferguson, H., Vardeman, C., and Nabrzyski, J. (2016, January 5\u20138). Linked data view methodology and application to BIM alignment and interoperability. Proceedings of the 2016 IEEE International Conference on Big Data (Big Data\u201916), Washington, DC, USA.","DOI":"10.1109\/BigData.2016.7840905"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.autcon.2014.04.009","article-title":"Building Information Modeling (BIM) application framework: The process of expanding from 3D to computable nD","volume":"46","author":"Ding","year":"2014","journal-title":"Autom. Constr."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dawood, M.H. (2016, January 15\u201316). BIM based optimal life cycle cost of sustainable house framework. Proceedings of the 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC\u201916), Muscat, Oman.","DOI":"10.1109\/ICBDSC.2016.7460381"},{"key":"ref_27","first-page":"6","article-title":"Research on Barriers of BIM Application in China\u2019s Building Industry","volume":"1","author":"Pan","year":"2012","journal-title":"J. Eng. Manag."},{"key":"ref_28","unstructured":"Mohd, S., and Latiffi, A.A. (2013, January 19\u201321). Building Information Modeling (BIM) application in construction planning. Proceedings of the 7th International Conference on Construction in the 21st Century (CITC-VII), Bangkok, Thailand."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ferreira, C., Resende, R., and Martinho, S. (2018). Beacons and BIM Models for Indoor Guidance and Location. Sensors, 18.","DOI":"10.20944\/preprints201810.0682.v1"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.1109\/TLA.2012.6222580","article-title":"Actkit: A framework for the definition and enforcement of role, content and context-based access control policies","volume":"10","author":"Betarte","year":"2012","journal-title":"IEEE Latin Am. Trans."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/2\/47\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:22Z","timestamp":1760185822000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/2\/47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,1]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["info10020047"],"URL":"https:\/\/doi.org\/10.3390\/info10020047","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2019,2,1]]}}}