DocumentCode :
256100
Title :
Access control using mobile agents
Author :
Idrissi, Hind ; Ennahbaoui, Mohammed ; Souidi, El Mamoun ; Revel, Arnaud ; Elhajji, Said
Author_Institution :
LabMIA, Mohammed V-Agdal Univ., Rabat, Morocco
fYear :
2014
fDate :
14-16 April 2014
Firstpage :
1216
Lastpage :
1221
Abstract :
Recent days, the areas of internet and network computing recognize a fast development, especially with distributed computing and efficient storage technologies that make sharing and diffusion of system resources more easier. However, if the information system didn´t adopt a security policy it may undergo serious damages. In this paper, we will propose a logical security scheme based on an access control policy. We will use the RBAC model applied with mobile agent paradigm to ensure authentication and identification of system entities, as well as to guarantee confidentiality and integrity of data involved in the scheme.
Keywords :
Internet; authorisation; data integrity; identification; information systems; mobile agents; Internet; RBAC model; data integrity; distributed computing; information system; logical security scheme; mobile agents; network computing; role-based access control policy; security policy; serious damages; storage technologies; system authentication; system identification; system resources diffusion; Authentication; Context; Cryptography; Mobile agents; Mobile communication; Standards; RBAC model; access control; information system; mobile agent; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Computing and Systems (ICMCS), 2014 International Conference on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4799-3823-0
Type :
conf
DOI :
10.1109/ICMCS.2014.6911154
Filename :
6911154
Link To Document :
بازگشت