Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1821748.1821873acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Design of RBAC-based secure KAgent framework for home network applications

Published: 14 December 2009 Publication History

Abstract

Home network is a residential local area network where digital home appliances are connected with each other. In a home network, access control is an essential factor to provide a proper service to an authorized user. In this environment, there is a home server, which manages user's accesses to external sources. It prevents unauthorized users from accessing home appliances on the network. In this paper, we propose a role-based access control (RBAC) framework using mobile agents in home network environments. This framework, called Role-based KAgent framework, controls the users' authorities based on RBAC so that it manages the access control list in each device independently. Also, it guarantees secure role assignment using the role tickets introduced in the proposed framework.

References

[1]
Rose, B. 2001. Home Networks: A Standard Perspective. IEEE Communication Magazine, 39, 12(Dec. 2001), 78--85.
[2]
Aneiba, A., and Rees, J. S. 2004. Mobile Agent Technology and Mobility. Proc. of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting.
[3]
Karjoth, G., Lange, D., and Oshima, M. 1997. A Security Model for Aglets. IEEE Trans. on Internet Computing, 4, 68--77.
[4]
Karnik, N. M., and Tripathi, A. R. 2000. A Security Architecture for Mobile Agents in Ajanta. Proc. of the 20th Int'l Conf. on Distributed Computing Systems, 402.
[5]
Mazlan, M. A., Samsudin, A., and Budiarto, R. 2003. Secure Groups Communication for Mobile Agents Based on Public Key Infrastructure. Proc. of the 9th Asia-Pacific Conf. on Communications (APCC 2003), 3, 1023--1027.
[6]
Xinhuai, T., Yaying, Z., and Jinyuan, Y. 2003. RCACM: Role-Based Context Coordination Model for Mobile Agent Applications. Proc. of the 2nd Int. Workshop on Grid and Cooperative Computing, 3033, 702--705.
[7]
Navarro, G., Robles, S., and Borrell, J. 2002. Role-Based Access Control for E-commerce Sea-of-Data Applicaton. Proc. of the Information Security Conference 2002, 2433, 102.
[8]
Cabri, G., Ferrari, L., and Zambonelli, F. 2003. Role Based Approaches for Engineering Interactions in Large-scale Multi-Agent System. Post-Proc. of Advances in Software Engineering for Large-Scale Multiagent Systems(SELMAS 03).
[9]
Cho, H., Kim, G. S., Kim, K., and Eom, Y. I. 2005. Development of Lightweight Mobile Agent Platform for URC Environments. Proc. of the 2nd Int'l Conf. on Ubiquitous Robots and Ambient Intelligence, 70--76.
[10]
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and Chandramouli, R. 2001. Proposed NIST Standard for Role-Based Access Control. ACM Trans. on Information and System Security (TISSEC), 4, 3, 224--274.
[11]
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Younman, C. E. 1996. Role-based access control model. IEEE Trans. On Computer, 29, 2, 38--47.
[12]
Tsai, C. F., and Wu, H. C. 2002. MASSIHN: A Multi-agent Architecture for Intelligent Home Network Service. IEEE Trans. on Computer Electronics, 48, 3, 505--514.
[13]
Corradi, A., Montanari, R., and Stefanelli, C. 1999. Security Issues in Mobile Agent Technology. Proc. of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems, 3--8.
[14]
Vitabile, S., Conti, V., Militello, C., and Sorbello, F. 2009. An extended JADE-S based Framework for Developing Secure Multi-Agent Systems. Computer Standards & Interfaces, 31, 5(Sep. 2009), 913--930.
[15]
Bellifemine, F., Caire, G., and Greenwood., D. 2007. Developing multi-agent systems with JADE, Wiley Series in Agent Technology. ISBN 978-0-470-05747-6.

Index Terms

  1. Design of RBAC-based secure KAgent framework for home network applications

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
        December 2009
        663 pages
        ISBN:9781605586595
        DOI:10.1145/1821748
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        • Johannes Kepler University

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 14 December 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. home networks
        2. mobile agents
        3. role
        4. role-based access control

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        MoMM '09
        Sponsor:

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 77
          Total Downloads
        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media