An agent and RBAC model to secure cooperative information systems
Abstract
References
Index Terms
- An agent and RBAC model to secure cooperative information systems
Recommendations
A MAS for access control management in cooperative information systems
MEDES '13: Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystemsThis proposition deals with interoperation of data and security policies in cooperative information systems. We use the agent paradigm for the treatment of distributed programs and perform complex tasks through cooperation and interactions. A ...
DW-RBAC: A formal security model of delegation and revocation in workflow systems
One reason workflow systems have been criticized as being inflexible is that they lack support for delegation. This paper shows how delegation can be introduced in a workflow system by extending the role-based access control (RBAC) model. The current ...
Modeling location attributes using XACML-RBAC model
MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and MultimediaLocation-based access control (LBAC) takes the requester's location into account when deciding weather the requester should be granted access to the requested resource or not. Many models have been suggested to extend the Role-based access control (RBAC)...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- NECTEC: National Electronics and Computer Technology Center
- KU: Kasetsart University
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- NECTEC
- KU
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 134Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in