An RBAC Approach for Securing Access Control in a MAS Coordination Infrastructure
نویسندگان
چکیده
Access control is a main security issue in the management of complex information systems as well as Multi-agent Systems (MAS). In this paper we discuss the application of the Role-Based Access Control (RBAC) model in the context of TuCSoN coordination infrastructure for MAS. RBAC models and their extensions are currently considered the most effective approach for engineering access control in complex information systems and dynamic organisations. In this work we discuss how an RBAC-like approach is realised in TuCSoN by means of the Agent Coordination Context (ACC) notion, bringing together security as well as organisation issues; an ACC acts like an organisation abstraction released by the MAS infrastructure, defining the runtime context of an agent in terms of its actions/perceptions, and according to the roles it is playing inside an organisation.
منابع مشابه
Role-Based Access Control in MAS using Agent Coordination Contexts∗
Role-Based Access Control models (RBACs) – and their extensions – are currently considered the most effective approach for engineering access control in complex information systems and dynamic organisations. In this paper we consider their application in the context of Multi-Agent Systems (MAS) – in particular for models and infrastructures supporting role-based organisation models – by means o...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملRBAC-MAS & SODA: Experimenting RBAC in AOSE
Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA. In particular, we show how a clear separation between mechanisms and polici...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAn Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The new concept incorporates the need of both security management as used by role-based access control (RBAC) and agent functional behaviour in agent-oriented Software Engineering (AOSE). Our approach avoids weaknesses of ...
متن کامل