Skip to main content

An RBAC Based Policy Enforcement Coordination Model in Internet Environment

  • Conference paper
  • First Online:
Engineering and Deployment of Cooperative Information Systems (EDCIS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2480))

  • 487 Accesses

Abstract

An RBAC (Role Based Access Control) based and policy enforcement coordination (RBPEC) model suitable in Internet environment is described. Coordination deals with the interaction between different agents and also between agents and surrounding environments. A set of agents interacting with each other for a common global system task constitutes a coordination group. Coordination is combined with access control in RBPEC model. Role based access control is introduced for security concerns. Coordination policy is enforced in a distributed manner. The model has two advantages of being secure and scalable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. D. Gelernter, N. Carriero, Coordination languages and their significance, Communication of the ACM, 1992, 35(2): 97–107.

    Article  Google Scholar 

  2. T. W. Malone and K. Crowston, The Interdisciplinary Study of Coordination, ACM Computing Surveys, 1994, 26(1):87–119.

    Article  Google Scholar 

  3. M. Cremonini, A. Omicini, F. Zambonelli, Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach, Proceedings of 4th International Conference (COORDINATION 2000) on Coordination Languages and Model, 2000:99–114.

    Google Scholar 

  4. David Ferraiolo, Richard Kuhn, Role based access control, Proceedings of 15th NIST-NCSC National Computer Security Conference, 1992:554–563.

    Google Scholar 

  5. Bellettini Carlo, Bertino Elisa, Ferrari Elena, Role Based Access Control Models. Information Security Technical Report, 2001, 6(2): 21–29.

    Article  Google Scholar 

  6. A. Lin, R. Brown, The application of security policy to role-based access control and the common data security architecture, Computer Communication, 23(17), 2000: 1584–1593.

    Article  Google Scholar 

  7. N Carriero and D Gelernter. Linda in Context. Communications of the ACM, 1989, 32(4): 444–458.

    Article  Google Scholar 

  8. Carolton McDonald, Masoud Yazdani. Prolog programming-a tutorial introduction. Oxford, 1990.

    Google Scholar 

  9. Naftaly H. Minsky, Yaron M. Minsky, Victoria Ungureanu, Safe Tuplespace-Based Coordination in Multi-Agent Systems, Jounal of Applied Artificial Intelligence, 2001, 15(1): 11–33.

    Article  Google Scholar 

  10. Naftaly H. Minsky, Victoria Ungureanu, Law-Governed Interaction: a Coordination and Control Mechanism for Heterogeneous Distributed Systems, ACM Transaction On Software Engineering and Methodology, 2000, 9(3): 273–305.

    Article  Google Scholar 

  11. G. A. Papadopoulos, F. Arbab, Coordination Models and Languages, Advances in Computers, 46(The Engineering of Large Systems), 1998: 329–400.

    Google Scholar 

  12. Davide Rossi, Giacomo Cabri, Enrico Denti, Tuple-based technologies for coordination, In A. Omicini, F. Zambonelli, M. Klusch, R. Toldsdorf(Eds.), Coordination of Internet Agents, Springer, 2001:83–109.

    Google Scholar 

  13. Farhad Arbab, Carolyn L. Talcott (Eds.): Coordination Models and Languages, 5th International Conference, COORDINATION 2002, Lecture Notes in Computer Science, Vol. 2315, Berlin Heidelberg New York (2002).

    MATH  Google Scholar 

  14. Nadeem Jamali, Prasannaa Thati, Gul A. Agha, An Actor-based Architecture for Customizing and Controlling Agent Ensembles, IEEE Intelligent Systems, 1999, 14(2):38–44.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., You, J. (2002). An RBAC Based Policy Enforcement Coordination Model in Internet Environment. In: Han, Y., Tai, S., Wikarski, D. (eds) Engineering and Deployment of Cooperative Information Systems. EDCIS 2002. Lecture Notes in Computer Science, vol 2480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45785-2_37

Download citation

  • DOI: https://doi.org/10.1007/3-540-45785-2_37

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44222-6

  • Online ISBN: 978-3-540-45785-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics