Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions

  • Iman Ben Abdelkrim
  • Amine Baina
  • Christophe Feltus
  • Jocelyn Aubert
  • Mostafa Bellafkih
  • Djamel Khadraoui
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 745)


In various collaborative environments, autonomous domains form coalitions to achieve shared goals. In most cases, these coalitions are dynamic in nature, as domains leave and new ones join the coalition. Normally, the coalition members have internal access control policies in place. Secure sharing of data requires that the members can exercise fine-grained access control over the shared resources governed by their own security policies. This paper presents an agent-based access control model for dynamic coalitions, which layers coalition management on top of an OrBAC model, and describes our proposition on implementing access control to manage sharing of resources between sector-agnostic monitoring multi-agent system platforms.


Dynamic coalitions Access control models Security models OrBAC model 


  1. 1.
    Kalam, A.A.E., et al.: Organization based access control. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, pp. 120–131 (2003)Google Scholar
  2. 2.
    Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRefGoogle Scholar
  3. 3.
    Aubert, J., Feltus, C., Kostakis, A., Khadraoui, D.: Smart-X: an adaptive multi-agent platform for smart-topics. Procedia Comput. Sci. 109(2016), 943–948 (2017)CrossRefGoogle Scholar
  4. 4.
    Cuppens, F., Ege, A.: Modelling contexts in the Or-BAC model. In: 19th Annual Computer Security Applications Conference, Las Vegas (2003)Google Scholar
  5. 5.
    Kalam, A.A.E., Deswarte, Y.: MultiOrBAC: a new access control model for distributed, heterogeneous and collaborative systems. In: IEEE Symposium on Systems and Information Security, Sao Paulo, Brazil (2006)Google Scholar
  6. 6.
    Kalam, A.A.E., Deswarte, Y., Baïna, A., Kaâniche, M.: PolyOrBAC: a security framework for critical infrastructures. Int. J. Crit. Infrastruct. Prot. 2(4), 154–169 (2009)CrossRefGoogle Scholar
  7. 7.
    Baina, A., Kalam, A.A.E., Deswarte, Y., Kaaniche, M.: Collaborative Access Control for Critical Infrastructures, pp. 189–201. Springer, Boston (2008)Google Scholar
  8. 8.
    Ben Abdelkrim, I., Baina, A., Bellafkih, M.: Automation of access control negotiation in dynamic coalitions for electrical critical infrastructures. In: 2016 International Conference on Electrical and Information Technologies (ICEIT), pp. 349–354 (2016)Google Scholar
  9. 9.
    Phillips, C.E., Demurjian, S.A., Ting, T.C.: Towards information assurance for dynamic coalitions. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 87–96 (2002)Google Scholar
  10. 10.
    Shands, D., Yee, R., Jacobs, J., Sebes, E.J.: Secure virtual enclaves: supporting coalition use of distributed application technologies. In: Proceedings DARPA Information Survivability Conference and Exposition. DISCEX 2000, vol. 1, pp. 335–350 (2002)Google Scholar
  11. 11.
    Gligor, V.D., Khurana, H., Koleva, R.K., Bharadwaj, V.G., Baras, J.S.: On the Negotiation of Access Control Policies, pp. 188–201. Springer, Heidelberg (2002)zbMATHGoogle Scholar
  12. 12.
    Khurana, H., Gligor, V.D.: A model for access negotiations in dynamic coalitions. In: 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 205–210 (2004)Google Scholar
  13. 13.
    Khurana, H., et al.: Integrated security services for dynamic coalitions. In: Proceedings DARPA Information Survivability Conference and Exposition, vol. 2, pp. 38–40 (2003)Google Scholar
  14. 14.
    Woo, J.W., Hwang, M.J., Lee, C.G., Youn, H.Y.: Dynamic role-based access control with trust-satisfaction and reputation for multi-agent system. In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, pp. 1121–1126 (2010)Google Scholar
  15. 15.
    Feltus, C., Khadraoui, D., Aubert, J.: A security decision-reaction architecture for heterogeneous distributed network. In: International Conference on Availability, Reliability, and Security, ARES 2010, pp. 1–8. IEEE (2010)Google Scholar
  16. 16.
    Bellifemine, F., Poggi, A., Rimassa, G.: JADE – a FIPA-compliant agent framework. In: Proceedings of PAAM 1999, no. 97–108, p. 33 (1999)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Iman Ben Abdelkrim
    • 1
    • 2
  • Amine Baina
    • 1
  • Christophe Feltus
    • 2
  • Jocelyn Aubert
    • 2
  • Mostafa Bellafkih
    • 1
  • Djamel Khadraoui
    • 2
  1. 1.STRS Laboratory, RAISS TeamNational Institute of Posts and Telecommunications (INPT)RabatMorocco
  2. 2.Luxembourg Institute of Science and TechnologyEsch-sur-AlzetteLuxembourg

Personalised recommendations