• DocumentCode
    256100
  • Title

    Access control using mobile agents

  • Author

    Idrissi, Hind ; Ennahbaoui, Mohammed ; Souidi, El Mamoun ; Revel, Arnaud ; Elhajji, Said

  • Author_Institution
    LabMIA, Mohammed V-Agdal Univ., Rabat, Morocco
  • fYear
    2014
  • fDate
    14-16 April 2014
  • Firstpage
    1216
  • Lastpage
    1221
  • Abstract
    Recent days, the areas of internet and network computing recognize a fast development, especially with distributed computing and efficient storage technologies that make sharing and diffusion of system resources more easier. However, if the information system didn´t adopt a security policy it may undergo serious damages. In this paper, we will propose a logical security scheme based on an access control policy. We will use the RBAC model applied with mobile agent paradigm to ensure authentication and identification of system entities, as well as to guarantee confidentiality and integrity of data involved in the scheme.
  • Keywords
    Internet; authorisation; data integrity; identification; information systems; mobile agents; Internet; RBAC model; data integrity; distributed computing; information system; logical security scheme; mobile agents; network computing; role-based access control policy; security policy; serious damages; storage technologies; system authentication; system identification; system resources diffusion; Authentication; Context; Cryptography; Mobile agents; Mobile communication; Standards; RBAC model; access control; information system; mobile agent; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Multimedia Computing and Systems (ICMCS), 2014 International Conference on
  • Conference_Location
    Marrakech
  • Print_ISBN
    978-1-4799-3823-0
  • Type

    conf

  • DOI
    10.1109/ICMCS.2014.6911154
  • Filename
    6911154