Secure mobile agent environments: modelling role assignments Online publication date: Sat, 25-Oct-2008
by Christos K. Georgiadis, Dimitrios Baltatzis, George Pangalos
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 1, No. 3, 2008
Abstract: This article exploits the idea of using the role-based access control model for the mobile agent authorisation problem. In our approach, when an agent migrates to a specific platform, the host assigns it a role from the local role hierarchy. The assignment is based on role decomposition that every host is eligible to perform according to a set of well-established rules. We analyse the matching procedure and we demonstrate a role management system application which is capable to compare roles and thus to assign local roles to upcoming agent roles. Moreover, we present our first efforts to model mobile agent behaviour using Coloured Petri-Nets, a powerful modelling language for systems in which communication and resource distribution play a very important role.
Online publication date: Sat, 25-Oct-2008
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com