Skip to main content

MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems

  • Conference paper
  • First Online:
  • 999 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10694))

Abstract

Facing the current evolution of networks infrastructure and the expansion of the information system in organizations and businesses, protecting data and resources against unauthorized access and unauthorized disclosure, is an important requirement of any information management system. In this context, diverse security issues are amplified. Particularly, access control seems of main importance because it ensures diverse security services, such as, authentication, identification, confidentiality and integrity. Several works are devoted for designing access control models. In this paper, we work to improve Multi-OrBAC model by introducing a new distributed access control model based on Mobile Agent.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lampson, B.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, pp. 437–443, March 1971

    Google Scholar 

  2. Bell, D.E., LaPadula, L.J.: Secure computer systems: unified exposition and multics interpretation. Technical report ESD-TR-73-306, The MITRE Corporation, March 1976

    Google Scholar 

  3. Kuhn, D.F.: Role-based access controls. In: 15th National Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  4. EI Kalam, A.A.: ORBAC: un modèle de contrôle d’accès basé sur les organisations (2003)

    Google Scholar 

  5. Sandhu, R.S., Samarati, P.: Access controls, principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)

    Article  Google Scholar 

  6. Wei, Y., Shi, C., Shao, W.: An attribute and role based access control model for service-oriented environment. In: Proceedings of the Chinese Control and Decision Conference, pp. 4451–4455 (2010)

    Google Scholar 

  7. Ferber, J.: Multi-agent Systems An Introduction to Distributed Artificial Intelligence. Addison – Wesley, Boston (1999)

    Google Scholar 

  8. Manvi, S.S., Venkataram, P.: Applications of agent technology in communications: a review. Comput. Commun. 27, 1493–1508 (2004)

    Article  Google Scholar 

  9. Magedanz, T., Rothermel, K.: Intelligent agents: an emerging technology for next generation telecommunications. In: Proceedings of the IEEE Globecom, London, UK, pp. 464–472 (1996)

    Google Scholar 

  10. Lange, D.B., Oshima, M.: Dispatch your agents; shut off your machine. Commun. ACM 42(3), 88–89 (1999)

    Article  Google Scholar 

  11. Wang, W.: The design of a trust and role access control model in cloud. IEEE (2011)

    Google Scholar 

  12. Sun, L., Wang, H.: Semantic access control for cloud computing based on e-Healthcare. In: Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 512–518. IEEE (2012)

    Google Scholar 

  13. Kim, S.: Building hybrid access control by configuring RBAC and MAC features. Inf. Softw. Technol. 56, 763–792 (2014)

    Article  Google Scholar 

  14. El Kalam, A.A., Deswarte, Y., Baïna, A., Kaâniche, M.: PolyOrBAC: a security framework for critical infrastructures. Int. J. Crit. Infrastruct. Prot. 2(4), 154–169 (2009)

    Article  Google Scholar 

  15. Idrissi, H.: Access control using mobile agents. In: International Conference on Multimedia Computing and Systems ICMCS (2014)

    Google Scholar 

  16. Thomas, M.V.: Agent-based approach for distributed access. In: International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013 (2013)

    Google Scholar 

  17. Varadharajan, V., Kumar, N., Mu, Y.: Security agent based distributed authorization: an approach. In: Proceedings of the 21st National Information Systems Security Conference (NISSC), USA, pp. 315–328 (1998)

    Google Scholar 

  18. Antonopoulos, N., Koukoumpetsos, K., Shafarenko, A.: Access control for agent-based computing: a distributed approach. Internet Res. 11(1), 55–64 (2001)

    Article  Google Scholar 

  19. El Kalam, A.A., Deswarte, Y.: MultiOrBAC: a new access control model for distributed, heterogeneous and collaborative systems. In: IEEE Symposium on Systems and Information Security, Sao Paulo, Brazil (2006)

    Google Scholar 

  20. Biswas, B., Basuli, K.: A novel process for key exchange avoiding man-in-middle attack. Int. J. Adv. Res. Technol. (IJOART) I(4), 75–79 (2012)

    Google Scholar 

  21. Standard NIST-FIPS: Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication, vol. 197. NIST (2001)

    Google Scholar 

  22. Ferreira, A., Chadwick, D., Zao, G., Farinha, P., Correia, R., Chilro, R., Antunes, L.: How securely break into RBAC: the BTG-RBAC model. In: Proceedings from 25th Annual Computer Security Applications Conference - ACSAC (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeineb Ben Yahya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ben Yahya, Z., Barika Ktata, F., Ghedira, K. (2018). MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems. In: Cuppens, N., Cuppens, F., Lanet, JL., Legay, A., Garcia-Alfaro, J. (eds) Risks and Security of Internet and Systems. CRiSIS 2017. Lecture Notes in Computer Science(), vol 10694. Springer, Cham. https://doi.org/10.1007/978-3-319-76687-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-76687-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-76686-7

  • Online ISBN: 978-3-319-76687-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics