skip to main content
10.1145/3312662.3312674acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmssConference Proceedingsconference-collections
research-article

Secure Social Model Based on IRBAC Mobile

Published: 12 January 2019 Publication History

Abstract

The mobile agent completes the task through independent data software modules, with strong independence, autonomy and flexibility. However, mobile agents are still subject to some impact restrictions that are primarily related to security issues caused by mobility. To improve the security of the mobile agent community platform, this article provides an Interest Role_Base Access Control(IRBAC) based model to ensure security and privacy in complex social organizations.
In this paper, we propose a novel approach to solve the platform hosted security problems caused by mobile agents, especially those caused by unauthorized access attacks. Combined with the RBAC model, a personalized model IRBAC is proposed, which determines its own role according to the user's interest, and a secure and flexible role delegation model. Finally, we conducted a practical case study to evaluate our method to demonstrating its validity, reliability, and safety.

References

[1]
Papavassiliou, S., Puliafito, A., Tomarchio, O., & Ye, J. 2002. Mobile agent. Selected Areas in Communications IEEE Journal on, 20(4), 858--872.
[2]
Fok, C. L., Roman, G., & Lu, C. 2005. Mobile agent middleware for sensor networks: an application case study. International Symposium on Information Processing in Sensor Networks, pp.51.
[3]
Ghanea-Hercock, R. 2001. Solutions to security in mobile agent systems. Mobile Agents - Where Are They Going, pp.5/1--5/4.
[4]
Vieiramarques, P. M., Robles, S., Cucurull, J., Cruzcorreia, R. J., Navarro, G., & Mart, R. 2007. Secure integration of distributed medical data using mobile agents. IEEE Intelligent Systems, 21(6), 47--54.
[5]
Xiao, L., Robertson, D., Croitoru, M., Lewis, P., Dashmapatra, S., & Dupplaw, D., et al.2007. Adaptive Agent Model: an Agent Interaction and Computation Model. International Computer Software and Applications Conference, Vol.2, pp.153--158.
[6]
Karnik, N. M., & Tripathi, A. R.1998. Design issues in mobile agent programming systems. Concurrency IEEE, 6(3), 52--61.
[7]
Ferraiolo, D., Kuhn, R., & Sandhu, R. 2007. Rbac standard rationale: comments on "a critique of the ansi standard on role-based access control". IEEE Security & Privacy, 5(6), 51--53.
[8]
Folcik, V. A., An, G. C., & Orosz, C. G. 2007. The basic immune simulator: an agent-based model to study the interactions between innate and adaptive immunity. Theoretical Biology and Medical Modelling, 4, 1, 4(1), 39--39.
[9]
Ferraiolo, D. F. 1995. Role-based access control (RBAC): Features and motivations.
[10]
Santos-Pereira, C., Augusto, A. B., Cruz-Correia, R., & Correia, M. E. 2013. A Secure RBAC Mobile Agent Model for Healthcare Institutions - Preliminary Study. International Conference on Information Technology in Bio- and Medical Informatics (Vol.8060, pp.108--111). Springer, Berlin, Heidelberg.
[11]
Chen, T. L. 2012. A study on agent-based secure scheme for electronic medical record system. Journal of Medical Systems, 36(3), 1345--1357.
[12]
Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao, G., & Rui, C., et al.2010. How to Securely Break into RBAC: The BTG-RBAC Model. Computer Security Applications Conference, 2009. ACSAC '09, Vol.11, pp.23--31.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICMSS 2019: Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences
January 2019
292 pages
ISBN:9781450361897
DOI:10.1145/3312662
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • China University of Geosciences

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Interest Role_Base Access Control(IRBAC)
  2. Mobile agent
  3. Mobile agent Security
  4. Social Platform

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICMSS 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 32
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media