CRiBAC: Community-centric role interaction based access control model

被引:8
作者
Jung, Youna [1 ]
Joshi, James B. D. [2 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, ACIS Lab, Gainesville, FL 32611 USA
[2] Univ Pittsburgh, LERSAIS, Dept Informat Sci, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
Secure interaction; Secure cooperation; Access control; RBAC; Community computing; Multi-agent system;
D O I
10.1016/j.cose.2012.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most efficient solutions to complex and large-scale problems, multi-agent cooperation has been in the limelight for the past few decades. Recently, many research projects have focused on context-aware cooperation to dynamically provide complex services. As cooperation in the multi-agent systems (MASs) becomes more common, guaranteeing the security of such cooperation takes on even greater importance. However, existing security models do not reflect the agents' unique features, including cooperation and context-awareness. In this paper, we propose a Community-based Role interaction-based Access Control model (CRiBAC) to allow secure cooperation in MASs. To do this, we refine and extend our preliminary RiBAC model, which was proposed earlier to support secure interactions among agents, by introducing a new concept of interaction permission, and then extend it to CRiBAC to support community-based cooperation among agents. We analyze potential problems related to interaction permissions and propose two approaches to address them. We also propose an administration model to facilitate administration of CRiBAC policies. Finally, we present the implementation of a prototype system based on a sample scenario to assess the proposed work and show its feasibility. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:497 / 523
页数:27
相关论文
共 24 条
[1]  
[Anonymous], 2001, 6 ACM S ACCESS CONTR
[2]  
Bhatti R., 2005, ACM Transactions on Information and Systems Security, V8, P187, DOI 10.1145/1065545.1065547
[3]   GEO-RBAC: A spatially aware RBAC [J].
Damiani, Maria Luisa ;
Bertino, Elisa ;
Catania, Barbara ;
Perlasca, Paolo .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)
[4]  
Emory Healthcare, 2011, CAN TWITT HELP SAV L
[5]  
Ferrini R, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P145, DOI 10.1145/1542207.1542231
[6]  
Georgiadis ChristosK., 2001, ACM SACMAT, P21, DOI DOI 10.1145/373256.373259
[7]  
Greenberg S., 1991, COMPUTER SUPPORTED C
[8]   A generalized temporal role-based access control model [J].
Joshi, JBD ;
Bertino, E ;
Latif, U ;
Ghafoor, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) :4-23
[9]  
Jung Y, 2009, L N INST COMP SCI SO, V10, P304
[10]   A survey of security issue in multi-agent systems [J].
Jung, Youna ;
Kim, Minsoo ;
Masoumzadeh, Amirreza ;
Joshi, James B. D. .
ARTIFICIAL INTELLIGENCE REVIEW, 2012, 37 (03) :239-260