An Agent-Based Architecture to Add Security in a Cooperative Information System

Nowadays, information is considered a strategic, rather than an operational, resource for those organizations needing to share, and access to, heterogeneous and geographically widely-distributed information sources. Solutions proposed in industrial or academic research solve the problems linked to technical and semantic heterogeneity and take into account the principles of autonomy, transparency and evolutivity. However, few of these solutions consider the critical aspect of access control security in these architectures. This paper deals with this security aspect in a cooperative information system and is about the design of a system able to manage and control access security to global information shared among its stakeholders.

[1]  Danielle Boulanger,et al.  An Object Approach for Information System Cooperation , 1998, Inf. Syst..

[2]  Klaus R. Dittrich,et al.  Argos - A Configurable Access Control System for Interoperable Environments , 1995, DBSec.

[3]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[4]  Matunda Nyanchama,et al.  Information Flow Analysis in Role-based Security Systems 1 , 2007 .

[5]  Zahir Tari,et al.  Designing Security Agents for the DOK Federated System , 1997, DBSec.

[6]  Pierangela Samarati,et al.  Secure Interoperation of Heterogeneous Systems: A Mediator-Based Approach , 1998 .

[7]  Michael Wooldridge,et al.  Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .

[8]  Michael R. Genesereth,et al.  The Basis for Mediation , 1995, International Conference on Cooperative Information Systems.

[9]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[10]  Sujeet Shenoi,et al.  Security policy coordination for heterogeneous information systems , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[11]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[12]  Danielle Boulanger,et al.  A Role-Based Model for Access Control in Database Federations , 2001, ICICS.

[13]  Kincho H. Law,et al.  CHAOS: An Active Security Mediation System , 2000, CAiSE.

[14]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[15]  Danielle Boulanger,et al.  A Multi-Agent System using Semantic Metadata for the Cooperation among Multiple Information Sources , 2000 .

[16]  Michael R. Genesereth,et al.  The Conceptual Basis for Mediation Services , 1997, IEEE Expert.