Applying security policies through agent roles: A JAAS based approach

Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Role is a powerful concept that can be used to model agent interactions, both between different agents and between agents and environments. Roles allow agents to dynamically acquire capabilities to perform specific tasks, and therefore enable separation of concerns and code reusability in software development and maintenance. Permissions and security issues related to role's use should be carefully taken into account, especially when the agent scenario becomes open, including even mobile agents. In a Java agent scenario, we believe that the standard policy file mechanism does not suffice, because a fine grain permission management is required. This paper focuses on how to exploit the Java Authentication and Authorization Service (JAAS) at the role level in order to apply authorizations and local policies to Java agents for controlling the use of their roles.

[1]  张晓丽,et al.  Enterprise Java Beans技术架构分析 , 2001 .

[2]  Nicholas R. Jennings,et al.  The Gaia Methodology for Agent-Oriented Analysis and Design , 2000, Autonomous Agents and Multi-Agent Systems.

[3]  Cheng-Zhong Xu,et al.  Privilege delegation and agent-oriented access control in naplet , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[4]  Michael Luck,et al.  The agentlink agent technology roadmap draft , 2002 .

[5]  Letizia Leonardi,et al.  Role agent pattern: a developer guideline , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[6]  Maria Fasli Social interactions in multi-agent systems: a formal approach , 2003, IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003..

[7]  Letizia Leonardi,et al.  Embedding JAAS in agent roles to apply local security policies , 2004, PPPJ.

[8]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[9]  Letizia Leonardi,et al.  MailConfigurator: automatic configuration of e-mail accounts through Java mobile agents , 2004, PPPJ.

[10]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[11]  Michael Becht,et al.  ROPE: role oriented programming environment for multiagent systems , 1999, Proceedings Fourth IFCIS International Conference on Cooperative Information Systems. CoopIS 99 (Cat. No.PR00384).

[12]  Letizia Leonardi,et al.  A case study in role-based agent interactions , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..

[13]  NICHOLAS R. JENNINGS,et al.  An agent-based approach for building complex software systems , 2001, CACM.

[14]  Robin A. Gandhi,et al.  Locale-based access control: placing collaborative authorization decisions in context , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[15]  Letizia Leonardi,et al.  Injecting roles in Java agents through runtime bytecode manipulation , 2005, IBM Syst. J..

[16]  Letizia Leonardi,et al.  Agent role-based collaboration and coordination: a survey about existing approaches , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[17]  Mao Bi,et al.  Role based Access Control Model , 2003 .

[18]  Letizia Leonardi,et al.  A role-based mobile-agent approach to support e-democracy , 2005, Appl. Soft Comput..

[19]  Michael Luck,et al.  Agent technology: Enabling next generation computing , 2003 .