An RBAC Approach for Securing Access Control in a MAS Coordination Infrastructure

نویسندگان

  • Alessandro Ricci
  • Mirko Viroli
  • Andrea Omicini
چکیده

Access control is a main security issue in the management of complex information systems as well as Multi-agent Systems (MAS). In this paper we discuss the application of the Role-Based Access Control (RBAC) model in the context of TuCSoN coordination infrastructure for MAS. RBAC models and their extensions are currently considered the most effective approach for engineering access control in complex information systems and dynamic organisations. In this work we discuss how an RBAC-like approach is realised in TuCSoN by means of the Agent Coordination Context (ACC) notion, bringing together security as well as organisation issues; an ACC acts like an organisation abstraction released by the MAS infrastructure, defining the runtime context of an agent in terms of its actions/perceptions, and according to the roles it is playing inside an organisation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role-Based Access Control in MAS using Agent Coordination Contexts∗

Role-Based Access Control models (RBACs) – and their extensions – are currently considered the most effective approach for engineering access control in complex information systems and dynamic organisations. In this paper we consider their application in the context of Multi-Agent Systems (MAS) – in particular for models and infrastructures supporting role-based organisation models – by means o...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

RBAC-MAS & SODA: Experimenting RBAC in AOSE

Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA. In particular, we show how a clear separation between mechanisms and polici...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment

We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The new concept incorporates the need of both security management as used by role-based access control (RBAC) and agent functional behaviour in agent-oriented Software Engineering (AOSE). Our approach avoids weaknesses of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004