Skip to main content

Access Control of Federated Information Systems

  • Conference paper
Intelligence and Security Informatics (EuroIsI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5376))

Included in the following conference series:

  • 1296 Accesses

Abstract

Development of information systems should answer more and more to the problems of federated data sources and the problems with heterogeneous distributed information systems. The assurance of access data security realized in federated information systems with loose connection among local data sources is hard to achieve mainly for two reasons: local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and local autonomy of systems does not allow to create a global integrated security schema. To solve such problems we propose to use the intelligent agents that can assist in a process of real-time access by defined and undefined users to the data stored in different systems, subsystems or applications of federated information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press/Addison-Wesley (1994)

    Google Scholar 

  2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2) (1996)

    Google Scholar 

  3. Goncalves, G., Poniszewska-Maranda, A.: Role engineering: from design to evaluation of security schemas. Journal of Systems and Software 81 (2008)

    Google Scholar 

  4. Poniszewska-Maranda, A., Goncalves, G., Hemery, F.: Representation of extended RBAC model using UML language. In: Vojtáš, P., Bieliková, M., Charron-Bost, B., Sýkora, O. (eds.) SOFSEM 2005. LNCS, vol. 3381. Springer, Heidelberg (2005)

    Google Scholar 

  5. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems (1992)

    Google Scholar 

  6. Wooldridge, M.: An Introduction to MultiAgent Systems. John Wiley & Sons, Chichester (2002)

    Google Scholar 

  7. Weiss, G.: Multi-Agent Systems. The MIT Press, Cambridge (1999)

    Google Scholar 

  8. Singh, M., Huhns, M.: Readings in Agents. Morgan-Kaufmann Pub., San Francisco (1997)

    Google Scholar 

  9. Disson, E., Boulanger, D., Dubois, G.: A Role-Based Model for Access Control in Database Federations. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Park, J., Sandhu, R.: The UCON ABC Usage Control Model. ACM Transactions on Information and System Security 7(1) (February 2004)

    Google Scholar 

  11. Hammer, J., Mcleod, D.: An Approach to Resolving Semantic Heterogeneity in a Federation of Autonomous, Heterogeneous Database Systems. International Journal of Intelligent and Cooperative Information Systems 2(1) (1993)

    Google Scholar 

  12. Ouksel, A., Naiman, C.: Coordinating Context Building in Heterogeneous Information Systems. Journal of Intelligent Information Systems 3 (1994)

    Google Scholar 

  13. Sciore, E., Siegel, M., Rosenthal, A.: Using Semantic Values to Facilitate Interoperability Among Heterogeneous Information Systems. ACM Transactions on Database Systems 19(2) (1994)

    Google Scholar 

  14. Object Management Group, The Common Object Request Broker: Architecture and Specification (Revision 2.0). Object Management Group (OMG) (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poniszewska-Maranda, A. (2008). Access Control of Federated Information Systems. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89900-6_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89899-3

  • Online ISBN: 978-3-540-89900-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics