Agent-based Access Rights Delegation utilizing Social Relationships

Access control to resources is one of the most important issues for supporting human activities in the digital space. However, existing access control methods are not effective for temporal activities such as visitor access. In this paper, we focus on visitor access control nature in real space, and propose a novel access control scheme utilizing social relationships which is effective for temporal activities. We also evaluate capability of our scheme through experimental results using a prototype system.

[1]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[2]  Shigeru Fujita,et al.  Agent-Based Design Model of Adaptive Distributed Systems , 1998, Applied Intelligence.

[3]  Christos Grompanopoulos,et al.  Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing , 2010, 2010 14th Panhellenic Conference on Informatics.

[4]  Gail-Joon Ahn,et al.  Authorization management for role-based collaboration , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[5]  Fan Yang,et al.  Pervasive Computing Context Access Control Based on UCON_ABC Model , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[6]  Mao Bi,et al.  Role based Access Control Model , 2003 .

[7]  Gail-Joon Ahn,et al.  Role-based authorization constraints specification , 2000, TSEC.

[8]  Elisa Bertino,et al.  Context-Aware Adaptation of Access-Control Policies , 2008, IEEE Internet Computing.

[9]  Sang-Uk Shin,et al.  Intelligent Access Control Mechanism for Ubiquitous Applications , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[10]  Laurent Bussard,et al.  Context-Aware Access Control; Making Access Control Decisions Based on Context Information , 2006 .

[11]  Kenji Sugawara,et al.  Interactive Design Environment for Agent-Based System , 2005 .

[12]  Roberto Tamassia,et al.  Independently Verifiable Decentralized Role-Based Delegation , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[13]  Ramiro Liscano,et al.  Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems , 2008, WiMob.

[14]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[15]  Seyed Shahrestani,et al.  Role Based Access Control for Web-Based Teaching Systems , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[16]  Zhou Lili,et al.  UCONDFNND - An Effective Delegation Model , 2009, 2009 International Conference on Web Information Systems and Mining.

[17]  Young Ik Eom,et al.  Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments , 2008, 2008 IEEE International Performance, Computing and Communications Conference.