Secure and Flexible RBAC Scheme Using Mobile Agents View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Hind Idrissi , Mohammed Ennahbaoui , El Mamoun Souidi , Said El Hajji , Arnaud Revel

ABSTRACT

Distributed Computing shows a fast development, that makes sharing and diffusion of information more easier than before. However, ignoring to adopt a well defined security policy exposes the information system to serious damages and a wide variety of attacks. In this paper, we propose a new conception of access control where subjects and entities are modeled by autonomous mobile agents. Features of these later are combined with cryptographic mechanisms such as resistant-MITM Diffie-Hellman Key Exchange and digital signature, symmetric and elliptic curve encryption, as well as one-way hash functions. We have implemented the proposed scheme and conducted detailed experiments to evaluate the security and effectiveness of our scheme. More... »

PAGES

447-455

References to SciGraph publications

  • 2013. A Secure RBAC Mobile Agent Model for Healthcare Institutions - Preliminary Study in INFORMATION TECHNOLOGY IN BIO- AND MEDICAL INFORMATICS
  • 2001. Access Control: Policies, Models, and Mechanisms in FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN
  • 2012. OSDM: An Organizational Supervised Delegation Model for RBAC in INFORMATION SECURITY
  • Book

    TITLE

    Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015

    ISBN

    978-3-319-30296-6
    978-3-319-30298-0

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-30298-0_46

    DOI

    http://dx.doi.org/10.1007/978-3-319-30298-0_46

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1026295613


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of La Rochelle", 
              "id": "https://www.grid.ac/institutes/grid.11698.37", 
              "name": [
                "Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, University of Mohammed-V", 
                "L3I, University of La Rochelle"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Idrissi", 
            "givenName": "Hind", 
            "id": "sg:person.012627314745.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012627314745.31"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Mohammed V University", 
              "id": "https://www.grid.ac/institutes/grid.31143.34", 
              "name": [
                "Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, University of Mohammed-V"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ennahbaoui", 
            "givenName": "Mohammed", 
            "id": "sg:person.015615216745.47", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015615216745.47"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Mohammed V University", 
              "id": "https://www.grid.ac/institutes/grid.31143.34", 
              "name": [
                "Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, University of Mohammed-V"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Souidi", 
            "givenName": "El Mamoun", 
            "id": "sg:person.011103723115.99", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011103723115.99"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Mohammed V University", 
              "id": "https://www.grid.ac/institutes/grid.31143.34", 
              "name": [
                "Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, University of Mohammed-V"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hajji", 
            "givenName": "Said El", 
            "id": "sg:person.013532315371.80", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013532315371.80"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of La Rochelle", 
              "id": "https://www.grid.ac/institutes/grid.11698.37", 
              "name": [
                "L3I, University of La Rochelle"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Revel", 
            "givenName": "Arnaud", 
            "id": "sg:person.010634335021.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010634335021.86"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1133058.1133067", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000753896"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-33383-5_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007241868", 
              "https://doi.org/10.1007/978-3-642-33383-5_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-40093-3_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009125074", 
              "https://doi.org/10.1007/978-3-642-40093-3_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/375735.376120", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023183374"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.infsof.2010.11.015", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036461743"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45608-2_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047641674", 
              "https://doi.org/10.1007/3-540-45608-2_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.5121/ijaia.2012.3505", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1072613756"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.7763/ijcee.2013.v5.742", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1074032332"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.4018/978-1-59904-837-6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1096031711"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2016", 
        "datePublishedReg": "2016-01-01", 
        "description": "Distributed Computing shows a fast development, that makes sharing and diffusion of information more easier than before. However, ignoring to adopt a well defined security policy exposes the information system to serious damages and a wide variety of attacks. In this paper, we propose a new conception of access control where subjects and entities are modeled by autonomous mobile agents. Features of these later are combined with cryptographic mechanisms such as resistant-MITM Diffie-Hellman Key Exchange and digital signature, symmetric and elliptic curve encryption, as well as one-way hash functions. We have implemented the proposed scheme and conducted detailed experiments to evaluate the security and effectiveness of our scheme.", 
        "editor": [
          {
            "familyName": "El Oualkadi", 
            "givenName": "Ahmed", 
            "type": "Person"
          }, 
          {
            "familyName": "Choubani", 
            "givenName": "Fethi", 
            "type": "Person"
          }, 
          {
            "familyName": "El Moussati", 
            "givenName": "Ali", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-30298-0_46", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-30296-6", 
            "978-3-319-30298-0"
          ], 
          "name": "Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015", 
          "type": "Book"
        }, 
        "name": "Secure and Flexible RBAC Scheme Using Mobile Agents", 
        "pagination": "447-455", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-30298-0_46"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "7d4514227f1930adbb7d78f28a832668478c3d59ab82f7c05da4d0734a350705"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1026295613"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-30298-0_46", 
          "https://app.dimensions.ai/details/publication/pub.1026295613"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T19:09", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8684_00000259.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-30298-0_46"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-30298-0_46'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-30298-0_46'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-30298-0_46'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-30298-0_46'


     

    This table displays all metadata directly associated to this object as RDF triples.

    137 TRIPLES      23 PREDICATES      36 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-30298-0_46 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N92a94d22e610450a892b1671e11b6d4c
    4 schema:citation sg:pub.10.1007/3-540-45608-2_3
    5 sg:pub.10.1007/978-3-642-33383-5_20
    6 sg:pub.10.1007/978-3-642-40093-3_10
    7 https://doi.org/10.1016/j.infsof.2010.11.015
    8 https://doi.org/10.1145/1133058.1133067
    9 https://doi.org/10.1145/375735.376120
    10 https://doi.org/10.4018/978-1-59904-837-6
    11 https://doi.org/10.5121/ijaia.2012.3505
    12 https://doi.org/10.7763/ijcee.2013.v5.742
    13 schema:datePublished 2016
    14 schema:datePublishedReg 2016-01-01
    15 schema:description Distributed Computing shows a fast development, that makes sharing and diffusion of information more easier than before. However, ignoring to adopt a well defined security policy exposes the information system to serious damages and a wide variety of attacks. In this paper, we propose a new conception of access control where subjects and entities are modeled by autonomous mobile agents. Features of these later are combined with cryptographic mechanisms such as resistant-MITM Diffie-Hellman Key Exchange and digital signature, symmetric and elliptic curve encryption, as well as one-way hash functions. We have implemented the proposed scheme and conducted detailed experiments to evaluate the security and effectiveness of our scheme.
    16 schema:editor N97a261a00e944fef80c7dd2491fd8621
    17 schema:genre chapter
    18 schema:inLanguage en
    19 schema:isAccessibleForFree false
    20 schema:isPartOf N27640d4485fd4089b53788dc60f0bdd6
    21 schema:name Secure and Flexible RBAC Scheme Using Mobile Agents
    22 schema:pagination 447-455
    23 schema:productId N07fb540d40c54d8c8c0d86b9371e1d1d
    24 N81fe35cd0ced48b4a496ea8c28fbfa59
    25 N8f0f68b777824a788fbbc1835e465d25
    26 schema:publisher Ne834b83ee7de421da2ba53d24a71b03d
    27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026295613
    28 https://doi.org/10.1007/978-3-319-30298-0_46
    29 schema:sdDatePublished 2019-04-15T19:09
    30 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    31 schema:sdPublisher N4fe1021b5ab44d7d8fa7b7440399e4d7
    32 schema:url http://link.springer.com/10.1007/978-3-319-30298-0_46
    33 sgo:license sg:explorer/license/
    34 sgo:sdDataset chapters
    35 rdf:type schema:Chapter
    36 N07fb540d40c54d8c8c0d86b9371e1d1d schema:name readcube_id
    37 schema:value 7d4514227f1930adbb7d78f28a832668478c3d59ab82f7c05da4d0734a350705
    38 rdf:type schema:PropertyValue
    39 N135b6dea05fa4f5381a24a93e75b8a0d schema:familyName Choubani
    40 schema:givenName Fethi
    41 rdf:type schema:Person
    42 N27640d4485fd4089b53788dc60f0bdd6 schema:isbn 978-3-319-30296-6
    43 978-3-319-30298-0
    44 schema:name Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015
    45 rdf:type schema:Book
    46 N2c116220028a4e5fbbf68301ea3fddf9 rdf:first sg:person.011103723115.99
    47 rdf:rest N59d2e13725a549dc91e1a1606c2f9259
    48 N4926bf7ceb0f4ed7a1aaa4905eaf3a56 rdf:first Nf7d2f83a4280480795e0ca6aae8cd377
    49 rdf:rest rdf:nil
    50 N4fe1021b5ab44d7d8fa7b7440399e4d7 schema:name Springer Nature - SN SciGraph project
    51 rdf:type schema:Organization
    52 N59d2e13725a549dc91e1a1606c2f9259 rdf:first sg:person.013532315371.80
    53 rdf:rest N76b29e52d2a648e98cec6d8fc39168ce
    54 N5cc53c0195314810893dbe609797810f rdf:first sg:person.015615216745.47
    55 rdf:rest N2c116220028a4e5fbbf68301ea3fddf9
    56 N76b29e52d2a648e98cec6d8fc39168ce rdf:first sg:person.010634335021.86
    57 rdf:rest rdf:nil
    58 N81fe35cd0ced48b4a496ea8c28fbfa59 schema:name doi
    59 schema:value 10.1007/978-3-319-30298-0_46
    60 rdf:type schema:PropertyValue
    61 N8f0f68b777824a788fbbc1835e465d25 schema:name dimensions_id
    62 schema:value pub.1026295613
    63 rdf:type schema:PropertyValue
    64 N92a94d22e610450a892b1671e11b6d4c rdf:first sg:person.012627314745.31
    65 rdf:rest N5cc53c0195314810893dbe609797810f
    66 N97a261a00e944fef80c7dd2491fd8621 rdf:first Nf31c2e77b95d4229aa676ec41db797fd
    67 rdf:rest Nfd5d9657513b4640a85e45516b488fd4
    68 Ne834b83ee7de421da2ba53d24a71b03d schema:location Cham
    69 schema:name Springer International Publishing
    70 rdf:type schema:Organisation
    71 Nf31c2e77b95d4229aa676ec41db797fd schema:familyName El Oualkadi
    72 schema:givenName Ahmed
    73 rdf:type schema:Person
    74 Nf7d2f83a4280480795e0ca6aae8cd377 schema:familyName El Moussati
    75 schema:givenName Ali
    76 rdf:type schema:Person
    77 Nfd5d9657513b4640a85e45516b488fd4 rdf:first N135b6dea05fa4f5381a24a93e75b8a0d
    78 rdf:rest N4926bf7ceb0f4ed7a1aaa4905eaf3a56
    79 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Information and Computing Sciences
    81 rdf:type schema:DefinedTerm
    82 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    83 schema:name Data Format
    84 rdf:type schema:DefinedTerm
    85 sg:person.010634335021.86 schema:affiliation https://www.grid.ac/institutes/grid.11698.37
    86 schema:familyName Revel
    87 schema:givenName Arnaud
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010634335021.86
    89 rdf:type schema:Person
    90 sg:person.011103723115.99 schema:affiliation https://www.grid.ac/institutes/grid.31143.34
    91 schema:familyName Souidi
    92 schema:givenName El Mamoun
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011103723115.99
    94 rdf:type schema:Person
    95 sg:person.012627314745.31 schema:affiliation https://www.grid.ac/institutes/grid.11698.37
    96 schema:familyName Idrissi
    97 schema:givenName Hind
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012627314745.31
    99 rdf:type schema:Person
    100 sg:person.013532315371.80 schema:affiliation https://www.grid.ac/institutes/grid.31143.34
    101 schema:familyName Hajji
    102 schema:givenName Said El
    103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013532315371.80
    104 rdf:type schema:Person
    105 sg:person.015615216745.47 schema:affiliation https://www.grid.ac/institutes/grid.31143.34
    106 schema:familyName Ennahbaoui
    107 schema:givenName Mohammed
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015615216745.47
    109 rdf:type schema:Person
    110 sg:pub.10.1007/3-540-45608-2_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047641674
    111 https://doi.org/10.1007/3-540-45608-2_3
    112 rdf:type schema:CreativeWork
    113 sg:pub.10.1007/978-3-642-33383-5_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007241868
    114 https://doi.org/10.1007/978-3-642-33383-5_20
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/978-3-642-40093-3_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009125074
    117 https://doi.org/10.1007/978-3-642-40093-3_10
    118 rdf:type schema:CreativeWork
    119 https://doi.org/10.1016/j.infsof.2010.11.015 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036461743
    120 rdf:type schema:CreativeWork
    121 https://doi.org/10.1145/1133058.1133067 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000753896
    122 rdf:type schema:CreativeWork
    123 https://doi.org/10.1145/375735.376120 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023183374
    124 rdf:type schema:CreativeWork
    125 https://doi.org/10.4018/978-1-59904-837-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1096031711
    126 rdf:type schema:CreativeWork
    127 https://doi.org/10.5121/ijaia.2012.3505 schema:sameAs https://app.dimensions.ai/details/publication/pub.1072613756
    128 rdf:type schema:CreativeWork
    129 https://doi.org/10.7763/ijcee.2013.v5.742 schema:sameAs https://app.dimensions.ai/details/publication/pub.1074032332
    130 rdf:type schema:CreativeWork
    131 https://www.grid.ac/institutes/grid.11698.37 schema:alternateName University of La Rochelle
    132 schema:name L3I, University of La Rochelle
    133 Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, University of Mohammed-V
    134 rdf:type schema:Organization
    135 https://www.grid.ac/institutes/grid.31143.34 schema:alternateName Mohammed V University
    136 schema:name Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, University of Mohammed-V
    137 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...