[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1936254.1936276acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

An agent and RBAC model to secure cooperative information systems

Published: 26 October 2010 Publication History

Abstract

The growing need to share information among independent sources is mostly satisfied by the construction of a Cooperative Information System. In our works, access schemas over physical tables or views of DBMS are described using a role-based model integrating constraints. This description allows to deal with problems related to the heterogeneity of access models, while keeping security properties of local schemas in order to comply with the autonomy of the cooperative stakeholders. In this paper, we describe the extensions proposed to the RBAC model to build access bridges among the local schemas. This proposition will be implemented in a Multi-Agents System ACSIS (Agents for the Cooperation of Secured Information Systems), compliant with XACML standard.

References

[1]
Shet A. -- "Changing focus on Interoperability in Information Systems: from system, Syntax, Structure to semantics -- In Interoperability Geographic Information Systems -- Kluwer Academic press -- 2000.
[2]
Boulanger D., Disson E., Dubois G. "Object-Oriented Metadata for Secured Cooperation of legacy Information Systems", International Workshop on Model enginearing IWME'00 Sophia-Antipolis and Cannes, France, 12--16th June, 2000.
[3]
Eßayr W., Kastner F., Pernul G., Preishuber S., Tjoa A. - Access Controls for Federated Database Environments. - Proceedings Joint IFIP TC 6 and TC 11 Working Conf. on Communications and Multimedia Security, Graz, Austria - 1995.
[4]
Lampson B. W. "Protection", Proc 5th Symp. On Information Sciences and Systems, Princeton University, March, 1971.
[5]
Bell D. E., Lapadula L. J. "Secure computer systems: mathematical foundations", ESD-TR-73-278, Vol 1--2, MITRE Corp., Bedford MA, 1973.
[6]
Ferraiolo D., Kuhn R. "Role-Based Access Control", proc. 15th National Computer Security Conference, Baltimore, October, 1992.
[7]
Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E. "Role-Based Access Control Models", IEEE Computer, Vol 29, n°2, pages 38--47, February, 1996.
[8]
Disson E., Boulanger D., Dubois G. "A Role-Based Model for Access Control in Database Federations", 3rd International Conference on Information and Communications Security, ICICS'01, Xian, China, 13--16 November 2001, LNCS 2229 Springer Verlag.
[9]
Wooldridge M., Jennings N. R.-- "Intelligent Agents: Theory and Practice" in Knowledge Engineering Review -- 1995.
[10]
Wiederhold G., Genesereth M. "Basis for Mediation"; Proceedings of COOPIS'95, Vienna Austria - 1995.
[11]
Nodine M., Fowler J., Ksiezyk T., Perry B., Taylor M., Unruh A. - "Active Information Gathering in InfoSleuth" - International Journal of Cooperative Information Systems, Vol. 9, No. 1--2. pp. 3--28. -- 2000.
[12]
Huin L., Boulanger D. Disson E., "Agents to secure Cooperative Information Systems". 3rd International Conference on Network & System Security-NSS 2009. Gold Coast, AUSTRALIE 2009.
[13]
Coma-Brebel C., Cuppens-Boulahia N., Cuppens F., Cavalli A. R. - A context ontology based approach for secure interoperability. HP-SUA 2007: HP Software University Association 2007, July 8--11, Garching/Munich, Germany, 2007
[14]
El Kalam A., El Baida R., Balbiani P., Benferhat S., Cuppens F., Deswarte Y., Miège A., Saurel C. et Trouessin G. - Organization Based Access Control. IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Come, Italy, June 4--6, 2003.
[15]
El Kalam A., Deswarte Y., Baina A., Kaâniche M. - 'Access control for collaborative systems: a Web Services Approach' - International Conference on Web Services ICWS'2007, IEEE Computer Society Press, Salt Lake city (UT, USA), July 2007, pp 1064--1071.
[16]
Jonscher D., Dittrich KR. -- "Argos A Configurable Access Control System for Interoperable Environments" - Database Security, IX: Status and Prospects -- 1995.
[17]
Dawson S., Qian S., Samarati P., "Secure Interoperation of Heterogeneous Systems: A Mediator-Based Approach" -Proceedings of the 14th IFIP TC-11 International Conference on Information Security - 1998.
[18]
Tari Z. -- "Designing Security Agents of the DOK Federated System" -- Database Security XI, IFIP - 1998.
[19]
Liu D., Law K., Wiederhold G. - "CHAOS: An Active Security Mediation System" - Proceedings of International Conference on Advanced Information Systems Engineering, LNCS, vol. 1789--2000.
[20]
Hale J., Galiasso P., Papa M., Shenoi S., "Security policy coordination for heterogeneous information systems" - Proceedings. 15th Annual Computer Security Applications Conference, 1999.
[21]
Martinez-Garcia C., Navarro-Arribas G., Borrell J. Martin-Campillo A., "An access control scheme for multi-agent systems over multi-domain environments" - Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems PAAMS'09, Salamanca (Spain), 25 th - 27 th March, 2009.
[22]
OASIS Project: www.oasis.org
[23]
JADE Plateform: jade.tilab.com
[24]
Wooldridge M., Jennings N. R., Kinny D. -- The Gaia Methodology for Agent Oriented Analysis and Design -- 3rd Conference on Autonomous Agents -- 2000.

Index Terms

  1. An agent and RBAC model to secure cooperative information systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MEDES '10: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
    October 2010
    302 pages
    ISBN:9781450300476
    DOI:10.1145/1936254
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • NECTEC: National Electronics and Computer Technology Center
    • KU: Kasetsart University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access control
    2. cooperative information systems
    3. interoperability
    4. role based access control (RBAC)
    5. security policy

    Qualifiers

    • Research-article

    Conference

    MEDES '10
    Sponsor:
    • NECTEC
    • KU

    Acceptance Rates

    MEDES '10 Paper Acceptance Rate 26 of 93 submissions, 28%;
    Overall Acceptance Rate 267 of 682 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 134
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media