Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent System

With rapid development of ubiquitous computing technology, the amount of context information collected from various sensors has been increased fast. These information should be managed and accessed by only the authorized person. In this paper we propose a new access control approach for multi-agent system based on the role-based access control (RBAC) model. To effectively reflect the continuously changing environment and user's role, the proposed dynamic RBAC scheme employs the notion of trust evaluated with the measure of satisfaction and reputation. It also updates the user's role and permission according to the context information. The effectiveness of the proposed approach is verified by computer simulation.

[1]  Alfons H. Salden,et al.  Context sensitive access control , 2005, SACMAT '05.

[2]  David F. Ferraiolo,et al.  An Examination of Federal and Commercial Access Control Policy Needs , 1993 .

[3]  Zongkai Yang,et al.  A Context Based Dynamic Access Control Model for Web Service , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[4]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[5]  Zhenxiang Chen,et al.  A Context, Rule and Role-Based Access Control Model In Enterprise Pervasive Computing Environment , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[6]  Hee Yong Youn,et al.  Modeling the contexts without distracting the perspectives of the agents in distributed reasoning , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[7]  Seng Wai Loke,et al.  Context-aware pervasive systems - architectures for a new breed of applications , 2019 .

[8]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[9]  Hee Yong Youn,et al.  An Efficient Dynamic Load Balancing Scheme for Multi-agent System Reflecting Agent Workload , 2009, 2009 International Conference on Computational Science and Engineering.

[10]  Seng Loke Context-Aware Pervasive Systems , 2006 .

[11]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[12]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[13]  Michael Luck,et al.  Agent technology: Enabling next generation computing , 2003 .

[14]  Junshan Li,et al.  A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[15]  Anind K. Dey,et al.  Context-Aware Computing: The CyberDesk Project , 1998 .

[16]  BeoumSun Kim,et al.  Agent platform-based directory facilitator for efficient service discovery , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[17]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[18]  Hee Yong Youn,et al.  A Flexible and Scalable Agent Platform for Multi-Agent Systems , 2007 .