Abstract
Facing the current evolution of networks infrastructure and the expansion of the information system in organizations and businesses, protecting data and resources against unauthorized access and unauthorized disclosure, is an important requirement of any information management system. In this context, diverse security issues are amplified. Particularly, access control seems of main importance because it ensures diverse security services, such as, authentication, identification, confidentiality and integrity. Several works are devoted for designing access control models. In this paper, we work to improve Multi-OrBAC model by introducing a new distributed access control model based on Mobile Agent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lampson, B.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, pp. 437–443, March 1971
Bell, D.E., LaPadula, L.J.: Secure computer systems: unified exposition and multics interpretation. Technical report ESD-TR-73-306, The MITRE Corporation, March 1976
Kuhn, D.F.: Role-based access controls. In: 15th National Computer Security Conference, pp. 554–563 (1992)
EI Kalam, A.A.: ORBAC: un modèle de contrôle d’accès basé sur les organisations (2003)
Sandhu, R.S., Samarati, P.: Access controls, principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)
Wei, Y., Shi, C., Shao, W.: An attribute and role based access control model for service-oriented environment. In: Proceedings of the Chinese Control and Decision Conference, pp. 4451–4455 (2010)
Ferber, J.: Multi-agent Systems An Introduction to Distributed Artificial Intelligence. Addison – Wesley, Boston (1999)
Manvi, S.S., Venkataram, P.: Applications of agent technology in communications: a review. Comput. Commun. 27, 1493–1508 (2004)
Magedanz, T., Rothermel, K.: Intelligent agents: an emerging technology for next generation telecommunications. In: Proceedings of the IEEE Globecom, London, UK, pp. 464–472 (1996)
Lange, D.B., Oshima, M.: Dispatch your agents; shut off your machine. Commun. ACM 42(3), 88–89 (1999)
Wang, W.: The design of a trust and role access control model in cloud. IEEE (2011)
Sun, L., Wang, H.: Semantic access control for cloud computing based on e-Healthcare. In: Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 512–518. IEEE (2012)
Kim, S.: Building hybrid access control by configuring RBAC and MAC features. Inf. Softw. Technol. 56, 763–792 (2014)
El Kalam, A.A., Deswarte, Y., Baïna, A., Kaâniche, M.: PolyOrBAC: a security framework for critical infrastructures. Int. J. Crit. Infrastruct. Prot. 2(4), 154–169 (2009)
Idrissi, H.: Access control using mobile agents. In: International Conference on Multimedia Computing and Systems ICMCS (2014)
Thomas, M.V.: Agent-based approach for distributed access. In: International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013 (2013)
Varadharajan, V., Kumar, N., Mu, Y.: Security agent based distributed authorization: an approach. In: Proceedings of the 21st National Information Systems Security Conference (NISSC), USA, pp. 315–328 (1998)
Antonopoulos, N., Koukoumpetsos, K., Shafarenko, A.: Access control for agent-based computing: a distributed approach. Internet Res. 11(1), 55–64 (2001)
El Kalam, A.A., Deswarte, Y.: MultiOrBAC: a new access control model for distributed, heterogeneous and collaborative systems. In: IEEE Symposium on Systems and Information Security, Sao Paulo, Brazil (2006)
Biswas, B., Basuli, K.: A novel process for key exchange avoiding man-in-middle attack. Int. J. Adv. Res. Technol. (IJOART) I(4), 75–79 (2012)
Standard NIST-FIPS: Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication, vol. 197. NIST (2001)
Ferreira, A., Chadwick, D., Zao, G., Farinha, P., Correia, R., Chilro, R., Antunes, L.: How securely break into RBAC: the BTG-RBAC model. In: Proceedings from 25th Annual Computer Security Applications Conference - ACSAC (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Ben Yahya, Z., Barika Ktata, F., Ghedira, K. (2018). MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems. In: Cuppens, N., Cuppens, F., Lanet, JL., Legay, A., Garcia-Alfaro, J. (eds) Risks and Security of Internet and Systems. CRiSIS 2017. Lecture Notes in Computer Science(), vol 10694. Springer, Cham. https://doi.org/10.1007/978-3-319-76687-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-76687-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76686-7
Online ISBN: 978-3-319-76687-4
eBook Packages: Computer ScienceComputer Science (R0)