Collaborative Computing: Networking, Applications and Worksharing. 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers

Research Article

RiBAC: Role Interaction Based Access Control Model for Community Computing

Download
454 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-03354-4_23,
        author={Youna Jung and Amirreza Masoumzadeh and James Joshi and Minkoo Kim},
        title={RiBAC: Role Interaction Based Access Control Model for Community Computing},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers},
        proceedings_a={COLLABORATECOM},
        year={2012},
        month={5},
        keywords={Cooperation Community computing Role interaction Role-based Access Control Multiagent system},
        doi={10.1007/978-3-642-03354-4_23}
    }
    
  • Youna Jung
    Amirreza Masoumzadeh
    James Joshi
    Minkoo Kim
    Year: 2012
    RiBAC: Role Interaction Based Access Control Model for Community Computing
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-642-03354-4_23
Youna Jung1,*, Amirreza Masoumzadeh1,*, James Joshi1,*, Minkoo Kim2,*
  • 1: University of Pittsburgh
  • 2: Ajou University
*Contact email: yjung@sis.pitt.edu, amirreza@sis.pitt.edu, jjoshi@sis.pitt.edu, minkoo@ajou.ac.kr

Abstract

Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as medical or military services, an access control mechanism is necessary to prevent unauthorized access to critical data or action. In this paper, we propose a family of (RiBAC) models for Community Computing, by extending the existing RBAC model to consider role interactions. As a basic model, we propose the core RiBAC model. For the convenience of management and to provide more fine-grained access control, we propose Hierarchical RiBAC (H-RiBAC), Constrained RiBAC (C-RiBAC), and Constrained Hierarchical RiBAC (CH-RiBAC) models. Finally, we extend the existing community computing framework to accommodate the specification and enforcement of RiBAC policies.