Secure and flexible RBAC scheme using mobile agents

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distributed Computing shows a fast development, that makes sharing and diffusion of information more easier than before. However, ignoring to adopt a well defined security policy exposes the information system to serious damages and a wide variety of attacks. In this paper, we propose a new conception of access control where subjects and entities are modeled by autonomous mobile agents. Features of these later are combined with cryptographic mechanisms such as resistant-MITM Diffie-Hellman Key Exchange and digital signature, symmetric and elliptic curve encryption, as well as one-way hash functions. We have implemented the proposed scheme and conducted detailed experiments to evaluate the security and effectiveness of our scheme.

Cite

CITATION STYLE

APA

Idrissi, H., Ennahbaoui, M., Souidi, E. M., Hajji, S. E., & Revel, A. (2016). Secure and flexible RBAC scheme using mobile agents. In Lecture Notes in Electrical Engineering (Vol. 381, pp. 447–455). Springer Verlag. https://doi.org/10.1007/978-3-319-30298-0_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free