Skip to main content

RBAC-MAS and SODA: Experimenting RBAC in AOSE

  • Conference paper
Engineering Societies in the Agents World IX (ESAW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5485))

Included in the following conference series:

Abstract

Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA. In particular, we show how a clear separation between mechanisms and policies can be achieved by organising the access control system along two layered sub-systems, and discuss the advantages of such an approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn. Wiley Computer, Chichester (2001)

    Google Scholar 

  2. Mouratidis, H., Giorgini, P.: Secure tropos: A security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering 17, 285–309 (2007)

    Article  Google Scholar 

  3. Henderson-Sellers, B., Giorgini, P. (eds.): Agent Oriented Methodologies. Idea Group Publishing, Hershey (2005)

    Google Scholar 

  4. Bergenti, F., Gleizes, M.P., Zambonelli, F. (eds.): Methodologies and Software Engineering for Agent Systems: The Agent-Oriented Software Engineering Handbook. Kluwer Academic Publishers, Dordrecht (2004)

    MATH  Google Scholar 

  5. Bernon, C., Cossentino, M., Pavón, J.: An overview of current trends in european AOSE research. Informatica 29, 379–390 (2005)

    Google Scholar 

  6. Liu, L., Yu, E., Mylopoulos, J.: Analyzing security requirements as relationships among strategic actors. In: 2nd Symposium on Requirements Engineering for Information Security (SREIS 2002), Electronic Proceedings, Raleigh, NC, USA (2002)

    Google Scholar 

  7. Yu, E., Cysneiros, L.M.: Designing for privacy and other competing requirements. In: 2nd Symposium on Requirements Engineering for Information Security (SREISí 2002), Electronic Proceedings, Raleigh, NC, USA (2002)

    Google Scholar 

  8. Omicini, A., Ricci, A., Viroli, M.: RBAC for organisation and security in an agent coordination infrastructure. Electronic Notes in Theoretical Computer Science 128, 65–85 (2005); 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo 2004), Proceedings (August 30, 2004)

    Google Scholar 

  9. Viroli, M., Omicini, A., Ricci, A.: Infrastructure for RBAC-MAS: An approach based on Agent Coordination Contexts. Applied Artificial Intelligence, Special Issue: State of Applications in AI Research from AI*IA 2005 21, 443–467 (2007)

    Article  Google Scholar 

  10. Johnson, M., Feltovich, P.J., Bradshaw, J.M., Bunch, L.: Human-robot coordination through dynamic regulation. In: IEEE International Conference on Robotics and Automation, ICRA 2008, Pasadena, California, May 19–23, 2008, pp. 2159–2164. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  11. Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Computer 29, 38–47 (1996)

    Article  Google Scholar 

  12. RBAC: American National Standard 359-2004 (Role Base Access Control – home page) (2004), http://csrc.nist.gov/rbac/

  13. Ferraiolo, D., Kuhn, R., Sandhu, R.: RBAC standard rationale: Comments on a critique of the ANSI standard on Role Based Access Control. IEEE Security & Privacy 5, 51–53 (2007)

    Article  Google Scholar 

  14. Omicini, A., Ricci, A., Viroli, M.: An algebraic approach for modelling organisation, roles and contexts in MAS. Applicable Algebra in Engineering, Communication and Computing, Special Issue: Process Algebras and Multi-Agent Systems 16, 151–178 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  15. Ricci, A., Viroli, M., Omicini, A.: An RBAC approach for securing access control in a MAS coordination infrastructure. In: Barley, M., Massacci, F., Mouratidis, H., Scerri, P. (eds.) 1st International Workshop Safety and Security in MultiAgent Systems (SASEMAS 2004), AAMAS 2004, Proceedings, New York, USA, pp. 110–124 (2004)

    Google Scholar 

  16. Molesini, A., Omicini, A., Viroli, M.: Environment in Agent-Oriented Software Engineering methodologies. Multiagent and Grid Systems, Special Issue on Environment Engineering for MAS 5 (2009)

    Google Scholar 

  17. Molesini, A., Omicini, A., Denti, E., Ricci, A.: SODA: A Roadmap to Artefacts. In: Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. LNCS, vol. 3963, pp. 49–62. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. SODA: Home page (2008), http://soda.apice.unibo.it/

  19. Omicini, A.: Formal ReSpecT in the A&A perspective. Electronic Notes in Theoretical Computer Sciences 175, 97–117 (2007); 5th International Workshop on Foundations of Coordination Languages and Software Architectures (FOCLASA 2006), CONCUR 2006, Post-proceedings, Bonn, Germany (August 31, 2006)

    Google Scholar 

  20. Molesini, A., Omicini, A., Ricci, A., Denti, E.: Zooming Multi-Agent Systems. In: Müller, J.P., Zambonelli, F. (eds.) AOSE 2005. LNCS, vol. 3950, pp. 81–93. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Drouineaud, M., Lüder, A., Sohr, K.: A role based access control model for agent based control systems. In: Unland, R., Ulieru, M., Weaver, A.C. (eds.) 1st IEEE International Conference on Industrial Informatics (INDIN 2003), Banff, Alberta, Canada, pp. 307–311 (2003)

    Google Scholar 

  22. Yamazaki, W., Hiraishi, H., Mizoguchi, F.: Designing an agent-based RBAC system for dynamic security policy. In: IEEE 13th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2004), 9th International Workshop Enterprise Security (ES 2004), Modena, Italy, pp. 199–204. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Molesini, A., Denti, E., Omicini, A. (2009). RBAC-MAS and SODA: Experimenting RBAC in AOSE. In: Artikis, A., Picard, G., Vercouter, L. (eds) Engineering Societies in the Agents World IX. ESAW 2008. Lecture Notes in Computer Science(), vol 5485. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02562-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02562-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02561-7

  • Online ISBN: 978-3-642-02562-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics