skip to main content
10.1145/2536146.2536170acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

A MAS for access control management in cooperative information systems

Published: 28 October 2013 Publication History

Abstract

This proposition deals with interoperation of data and security policies in cooperative information systems. We use the agent paradigm for the treatment of distributed programs and perform complex tasks through cooperation and interactions. A combination of two methods -- GAIA and AUML-- and a set of models are used. Two protocols are defined related to the features of the system: (i) a knowledge management protocol to address interoperability problems between different modes of data representation and security access models and, to generate the matches between these models, (ii) a query resolution protocol using global knowledge. Agents are described in their goals, their interactions, their knowledge by defining their roles for each protocol, including the key role of the security mediator. A prototype is implemented on the JADE platform (Java Agent Development Environment).

References

[1]
Bauer B., Müller J-P., and Odell J. "Agent UML: a formalism for specifying multiagent software systems" In First international workshop, AOSE 2000 on Agent-oriented software engineering, Michael J. Wooldridge and Paolo Ciancarini (Eds.). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2001
[2]
Bell D. E., Lapadula L. J. "Secure computer systems: mathematical foundations", ESD-TR-73-278, Vol 1--2, MITRE Corp., Bedford MA, 1973.
[3]
Bellifemine F., Caire G., Pogg A., and Rimassa G., "JADE: A White Paper" - EXP in search of innovation. - 2003.
[4]
Eßayr W., Kastner F., Pernul G., Preishuber S., Tjoa A. - "Access Controls for Federated Database Environments" - Proceedings Joint IFIP TC 6 and TC 11 Working Conf. on Communications and Multimedia Security, Graz, Austria - 1995.
[5]
Ferraiolo D., Kuhn R. "Role-Based Access Control", proc. 15th National Computer Security Conference, Baltimore, October, 1992.
[6]
Jennings, N R, Zambonelli, F, and M Wooldridge. "Developing multiagent systems: the Gaia Methodology". Engineering 12, no. 3: 2003
[7]
Lampson B. W. "Protection", Proc 5th Symp. On Information Sciences and Systems, Princeton University, March, 1971.
[8]
Martinez-Garcia C., Navarro-Arribas G., Borrell J. Martin-Campillo A., "An access control scheme for multi-agent systems over multi-domain environments" - Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems PAAMS'09, Salamanca (Spain), 25 th - 27 th March, 2009.
[9]
Moraïtis P., Petraki E., and Spanoudakis N. "Engineering JADE agents with the Gaia methodology". In Proceedings of the NODe 2002 agent-related conference on Agent technologies, infrastructures, tools, and applications for E-services (NODe'02), Ryszard Kowalczyk, J\&\#246;rg P. M\&\#252;ller, Huaglory Tianfield, and Rainer Unland (Eds.). Springer-Verlag, Berlin, Heidelberg, 2002.
[10]
Poniszewska A., "Multi-agent System for Access Control in Distributed Information Systems", Scalable Computing: Practice and Experience, Scientific International Journal for Parallel and distributed Computing, Volume 12, N° 4, 2011.
[11]
Poniszewska A., "Implementation of Access Control Model for Distributed Information Systems using Usage Control", SIIS 2011, LNCS 70 53, Springer Verlag, 2011.
[12]
Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E. "Role-Based Access Control Models", IEEE Computer, Vol 29, n° 2, pages 38--47, 1996.
[13]
Seleznyov A., Ahmed M. O. and Hailes S., "ADAM: An Agent-based Middleware Architecture for Distributed Access Control", the 22nd International multi-Conference on applied informatics, Innsbruck, Austria, 2004.
[14]
Sheth and Vipul "So Far (Schematically) yet So Near (Semantically) "Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems. - 1992.
[15]
Tari Z. -- "Designing Security Agents of the DOK Federated System" -- Database Security XI, IFIP - 1998.
[16]
Wooldridge M., Jennings N. R.-- "Intelligent Agents: Theory and Practice" in Knowledge Engineering Review -- 1995.
[17]
Wooldrige M., "Barriers to the industrial take-up of agent technology, in The Practical Application of Intelligent Agents and Multi-Agent Technology", London, p. 11, The Practical Application Company Ltd, April 1999.
[18]
Xiao L., Peet A., Lewis P., Dashmapatra S., Saez C., Croitoru M., Vicente J., Gonzalez-Velez H., and Lluch Ariet M. "An Adaptative Security Model for Multiagent Systems and Application to a Clinical Trials Environment", Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02 (COMPSAC '07), Vol. 2. IEEE Computer Society, Washington, DC, USA, 2007

Cited By

View all
  • (2022)Prevalence of Multi-Agent System Consensus in Cloud ComputingMulti Agent Systems10.1007/978-981-19-0493-6_4(55-86)Online publication date: 26-Apr-2022

Index Terms

  1. A MAS for access control management in cooperative information systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MEDES '13: Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
    October 2013
    358 pages
    ISBN:9781450320047
    DOI:10.1145/2536146
    • Conference Chairs:
    • Latif Ladid,
    • Antonio Montes,
    • General Chair:
    • Peter A. Bruck,
    • Program Chairs:
    • Fernando Ferri,
    • Richard Chbeir
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • LBBC: Luxembourg Brazil Business Council
    • IPv6 Luxembourg Council: Luxembourg IPv6 Council
    • Luxembourg Green Business Awards 2013: Luxembourg Green Business Awards 2013
    • LUXINNOVATION: Agence Nationale pour la Promotion de l Innovation et de la Recherche
    • Pro Newtech: Pro Newtech
    • CTI: Centro de Tecnologia da Informação Renato Archer

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 October 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access control
    2. cooperative information systems
    3. interoperability
    4. multi-agent system
    5. security policy

    Qualifiers

    • Research-article

    Conference

    MEDES '13
    Sponsor:
    • LBBC
    • IPv6 Luxembourg Council
    • Luxembourg Green Business Awards 2013
    • LUXINNOVATION
    • Pro Newtech
    • CTI

    Acceptance Rates

    MEDES '13 Paper Acceptance Rate 56 of 122 submissions, 46%;
    Overall Acceptance Rate 267 of 682 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Prevalence of Multi-Agent System Consensus in Cloud ComputingMulti Agent Systems10.1007/978-981-19-0493-6_4(55-86)Online publication date: 26-Apr-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media