Advertisement

ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets)

  • Mohamad Aljnidi
  • Jean Leneutre
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5939)

Abstract

This article deals with access control in Mobile Autonomic Networks (MAutoNets), which are basically mobile ad-hoc networks. Our goal is to build an autonomic access control system. We define the Secure Relation Based Access Control (SRBAC) model, which is a variant of RBAC adapted to the MAutoNet environment by using context information and supporting autonomic computing properties. We also define the administrative counterpart of SRBAC, called ASRBAC, that allows the network nodes to manage the access control system by themselves. ASRBAC uses the distributed model ARBAC02 as a basis, and extends it with context-awareness, self-management and self-adaptation.

Keywords

Access Control Trust Level Reputation System Access Control Model Administrative Action 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer (2003)Google Scholar
  2. 2.
    Dobson, S., Denazis, S., Fernandez, A., Gaiti, D., Gelenbe, E., Massacci, F., Nixon, P., Saffre, F., Schmidt, N., Zambonelli, F.: A survey of autonomic communications. ACM Transactions on Autonomous and Adaptive Systems (2006)Google Scholar
  3. 3.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer (1996)Google Scholar
  4. 4.
    Shafiq, B., Joshi, J., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing rbac policies. IEEE Trans. Knowl. Data Eng. (2005)Google Scholar
  5. 5.
    Shehab, M., Bertino, E., Ghafoor, A.: Secure collaboration in mediator-free environments. In: Proceedings of the 12th ACM Conference on Computer and Communication Security (2005)Google Scholar
  6. 6.
    Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (2001)Google Scholar
  7. 7.
    Zhang, G., Parashar, M.: Dynamic context-aware access control for grid applications. In: Proceedings of the 4th International Workshop on Grid Computing (2003)Google Scholar
  8. 8.
    Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (2003)Google Scholar
  9. 9.
    Zhang, X., Parisi-Presicci, F., Sandhu, R.: Formal model and policy specification of usage control. ACM Transactions on Information and System Security (2005)Google Scholar
  10. 10.
    Aljnidi, M., Leneutre, J.: Autonomic security for home networks. In: Proceedings of the First International Workshop on Self-Organizing Systems (2006)Google Scholar
  11. 11.
    Aljnidi, M., Leneutre, J.: Towards an autonomic security system for mobile ad hoc networks. In: Proceedings of the Third International Symposium on Information Assurance and Security (2007)Google Scholar
  12. 12.
    Aljnidi, M., Leneutre, J.: A security policy system for mobile autonomic networks. In: Proceedings of the First International Conference on Autonomic Computing and Communication Systems (2007)Google Scholar
  13. 13.
    Aljnidi, M., Leneutre, J.: Security solutions in mobile autonomic networks. In: Proceedings of the Third International Conference on Information and Communication Technologies: From Theory to Applications (2008)Google Scholar
  14. 14.
    Oh, S., Sandhu, R., Zhang, X.: An effective role administration model using organization structure. ACM Transactions on Information and System Security (2006)Google Scholar
  15. 15.
    Cuppens, F., Miege, A.: Administration model for or-BAC. In: Meersman, R., Tari, Z. (eds.) OTM-WS 2003. LNCS, vol. 2889, pp. 754–768. Springer, Heidelberg (2003)Google Scholar
  16. 16.
    Sandhu, R., Ranganathan, K., Zhang, X.: Secure information sharing enabled by trusted computing and pei models. In: Proceedings of the ACM Symposium on Information, Computer and Communication Security (2006)Google Scholar
  17. 17.
    Pirzada, A.A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wireless Personal Communications (2006)Google Scholar
  18. 18.
    Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP 6th Joint Working Conference on Communications and Multimedia Security (2002)Google Scholar
  19. 19.
    Hariri, S., Khargharia, B., Chen, H., Yang, J., Zhang, Y., Parashar, M., Liu, H.: The autonomic computing paradigm. Cluster Computing (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Mohamad Aljnidi
    • 1
  • Jean Leneutre
    • 1
  1. 1.Institut Telecom, Telecom ParisTech, LTCI CNRS 

Personalised recommendations