Abstract
Development of information systems should answer more and more to the problems of federated data sources and the problems with heterogeneous distributed information systems. The assurance of access data security realized in federated information systems with loose connection among local data sources is hard to achieve mainly for two reasons: local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and local autonomy of systems does not allow to create a global integrated security schema. To solve such problems we propose to use the intelligent agents that can assist in a process of real-time access by defined and undefined users to the data stored in different systems, subsystems or applications of federated information systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press/Addison-Wesley (1994)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2) (1996)
Goncalves, G., Poniszewska-Maranda, A.: Role engineering: from design to evaluation of security schemas. Journal of Systems and Software 81 (2008)
Poniszewska-Maranda, A., Goncalves, G., Hemery, F.: Representation of extended RBAC model using UML language. In: Vojtáš, P., Bieliková, M., Charron-Bost, B., Sýkora, O. (eds.) SOFSEM 2005. LNCS, vol. 3381. Springer, Heidelberg (2005)
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems (1992)
Wooldridge, M.: An Introduction to MultiAgent Systems. John Wiley & Sons, Chichester (2002)
Weiss, G.: Multi-Agent Systems. The MIT Press, Cambridge (1999)
Singh, M., Huhns, M.: Readings in Agents. Morgan-Kaufmann Pub., San Francisco (1997)
Disson, E., Boulanger, D., Dubois, G.: A Role-Based Model for Access Control in Database Federations. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229. Springer, Heidelberg (2001)
Park, J., Sandhu, R.: The UCON ABC Usage Control Model. ACM Transactions on Information and System Security 7(1) (February 2004)
Hammer, J., Mcleod, D.: An Approach to Resolving Semantic Heterogeneity in a Federation of Autonomous, Heterogeneous Database Systems. International Journal of Intelligent and Cooperative Information Systems 2(1) (1993)
Ouksel, A., Naiman, C.: Coordinating Context Building in Heterogeneous Information Systems. Journal of Intelligent Information Systems 3 (1994)
Sciore, E., Siegel, M., Rosenthal, A.: Using Semantic Values to Facilitate Interoperability Among Heterogeneous Information Systems. ACM Transactions on Database Systems 19(2) (1994)
Object Management Group, The Common Object Request Broker: Architecture and Specification (Revision 2.0). Object Management Group (OMG) (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poniszewska-Maranda, A. (2008). Access Control of Federated Information Systems. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-89900-6_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89899-3
Online ISBN: 978-3-540-89900-6
eBook Packages: Computer ScienceComputer Science (R0)