Secure Social Model Based on IRBAC Mobile

The mobile agent completes the task through independent data software modules, with strong independence, autonomy and flexibility. However, mobile agents are still subject to some impact restrictions that are primarily related to security issues caused by mobility. To improve the security of the mobile agent community platform, this article provides an Interest Role_Base Access Control(IRBAC) based model to ensure security and privacy in complex social organizations. In this paper, we propose a novel approach to solve the platform hosted security problems caused by mobile agents, especially those caused by unauthorized access attacks. Combined with the RBAC model, a personalized model IRBAC is proposed, which determines its own role according to the user's interest, and a secure and flexible role delegation model. Finally, we conducted a practical case study to evaluate our method to demonstrating its validity, reliability, and safety.

[1]  Ravi S. Sandhu,et al.  RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" , 2007, IEEE Security & Privacy.

[2]  Symeon Papavassiliou,et al.  Mobile agent-based approach for efficient network management and resource allocation: framework and applications , 2002, IEEE J. Sel. Areas Commun..

[3]  R. Ghanea-Hercock,et al.  Solutions to security in mobile agent systems , 2001 .

[4]  Bo Hu,et al.  Adaptive Agent Model: an Agent Interaction and Computation Model , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[5]  D. Richard Kuhn,et al.  Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .

[6]  Anand R. Tripathi,et al.  Design issues in mobile agent programming systems , 1998, IEEE Concurr..

[7]  Ramon Martí,et al.  Secure Integration of Distributed Medical Data Using Mobile Agents , 2006, IEEE Intelligent Systems.

[8]  Chenyang Lu,et al.  Mobile agent middleware for sensor networks: an application case study , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[9]  David R. Kuhn,et al.  Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .

[10]  G. An,et al.  The Basic Immune Simulator: An agent-based model to study the interactions between innate and adaptive immunity , 2007, Theoretical Biology and Medical Modelling.

[11]  David W. Chadwick,et al.  How to Securely Break into RBAC: The BTG-RBAC Model , 2009, 2009 Annual Computer Security Applications Conference.

[12]  Cátia Santos-Pereira,et al.  A Secure RBAC Mobile Agent Model for Healthcare Institutions - Preliminary Study , 2013, ITBAM.

[13]  Yu-Fang Chung,et al.  A Study on Agent-Based Secure Scheme for Electronic Medical Record System , 2012, Journal of Medical Systems.