DocumentCode
256100
Title
Access control using mobile agents
Author
Idrissi, Hind ; Ennahbaoui, Mohammed ; Souidi, El Mamoun ; Revel, Arnaud ; Elhajji, Said
Author_Institution
LabMIA, Mohammed V-Agdal Univ., Rabat, Morocco
fYear
2014
fDate
14-16 April 2014
Firstpage
1216
Lastpage
1221
Abstract
Recent days, the areas of internet and network computing recognize a fast development, especially with distributed computing and efficient storage technologies that make sharing and diffusion of system resources more easier. However, if the information system didn´t adopt a security policy it may undergo serious damages. In this paper, we will propose a logical security scheme based on an access control policy. We will use the RBAC model applied with mobile agent paradigm to ensure authentication and identification of system entities, as well as to guarantee confidentiality and integrity of data involved in the scheme.
Keywords
Internet; authorisation; data integrity; identification; information systems; mobile agents; Internet; RBAC model; data integrity; distributed computing; information system; logical security scheme; mobile agents; network computing; role-based access control policy; security policy; serious damages; storage technologies; system authentication; system identification; system resources diffusion; Authentication; Context; Cryptography; Mobile agents; Mobile communication; Standards; RBAC model; access control; information system; mobile agent; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Multimedia Computing and Systems (ICMCS), 2014 International Conference on
Conference_Location
Marrakech
Print_ISBN
978-1-4799-3823-0
Type
conf
DOI
10.1109/ICMCS.2014.6911154
Filename
6911154
Link To Document