ACSIS: Agents for Cooperative Secured Information Systems

Heterogeneity of information sources in a cooperative information system reveals problems linked with the homogenization of the local security policies. Thus, two kinds of heterogeneity are distinguished: heterogeneity of the local access security policies and semantic heterogeneity among instances of local sources related to objects/subjects (users). Using an extended role-based model, we consider not only the access security to information but also the organizational security not tackled in most research projects. The ACSIS project proposes an hybrid mediation-based architecture gathering object and agent paradigms.

[1]  B. Lampson,et al.  Protection 1 , 2022 .

[2]  Klaus R. Dittrich,et al.  Argos - A Configurable Access Control System for Interoperable Environments , 1995, DBSec.

[3]  Michael Wooldridge,et al.  Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .

[4]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[5]  Tomasz Ksiezyk,et al.  Intelligent Integration of Information. , 2000 .

[6]  Sylvia L. Osborn Mandatory access control and role-based access control revisited , 1997, RBAC '97.

[7]  Danielle Boulanger,et al.  An Agent-Based Architecture to Add Security in a Cooperative Information System , 2007, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System.

[8]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[9]  Michael R. Genesereth,et al.  The Basis for Mediation , 1995, International Conference on Cooperative Information Systems.

[10]  Zahir Tari,et al.  Designing Security Agents for the DOK Federated System , 1997, DBSec.

[11]  Michael R. Genesereth,et al.  The Conceptual Basis for Mediation Services , 1997, IEEE Expert.

[12]  Sujeet Shenoi,et al.  Security policy coordination for heterogeneous information systems , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[13]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[14]  Danielle Boulanger,et al.  A Role-Based Model for Access Control in Database Federations , 2001, ICICS.

[15]  Kincho H. Law,et al.  CHAOS: An Active Security Mediation System , 2000, CAiSE.

[16]  Pierangela Samarati,et al.  Secure Interoperation of Heterogeneous Systems: A Mediator-Based Approach , 1998 .

[17]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[18]  Danielle Boulanger,et al.  Utilisation d'XACML pour le contrôle d'accès dans les systèmes d'information coopératifs , 2006, INFORSID.

[19]  Guillermo Navarro-Arribas,et al.  An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments , 2009, PAAMS.

[20]  Marian H. Nodine,et al.  Active Information Gathering in InfoSleuth , 1999, CODAS.

[21]  Danielle Boulanger,et al.  An Object Approach for Information System Cooperation , 1998, Inf. Syst..