Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments |
Jung, Young-Woo
(성균관대학교 전자전기컴퓨터공학과)
Ko, Kwang-Sun (성균관대학교 이동통신공학과) Kim, Gu-Su (동양대학교 정보통신공학부) Eom, Young-Ik (성균관대학교 정보통신공학부) |
1 | Digital Home Working Group, Digital Home. White Paper, http://www.dhwg.org, June 2003 |
2 | G. Karjoth, D. Lange, and M. Oshima, 'A Security Model for Aglets,' IEEE Trans. on Internet Computing, Vol. 4, pp. 68-77, 1997 DOI ScienceOn |
3 | D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, 'Proposed NIST Standard for Role-Based Access Control,' ACM Trans. on Information and System Security (TISSEC), Vol. 4(3), pp. 224-274, 2001 DOI |
4 | G. Navarro, S. Robles, and J. Borrell, 'Role-Based Access Control for E-commerce Sea-of-Data Applicaton,' Proc. of the Information Security Conference 2002, 2002 |
5 | G. Cabri, L. Ferrari, and L. Leonardi, A role-based mobile-agent approach to support E-democracy, Science of Computer Programming (Article in Press) |
6 | A. Aneiba and J. S. Rees, 'Mobile Agent Technology and Mobility,' Proc. of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2004), 2004 |
7 | B. Rose, Home Networks: A Standard Perspective, IEEE Communication Magazine, pp. 78-85, 2001 |
8 | T. Xinhuai, Z. Yaying, and Y. Jinyuan, 'RCACM: Role-Based Context Coordination Model for Mobile Agent Applications,' Proc. of the 2nd Int. Workshop on Grid and Cooperative Computing, 2003 |
9 | A. Corradi, R. Montanari, and C. Stefanelli, 'Security Issues in Mobile Agent Technology,' Proc. of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems, 1999 DOI |
10 | A. Fuggetta, G. Picco, and G. Vigna, 'Understanding code mobility,' IEEE Trans. on Software Eng., Vol. 24(5), pp. 352-361, 1998 DOI ScienceOn |
11 | N. M. Karnik and A. R. Tripathi, 'A Security Architecture for Mobile Agents in Ajanta,' Proc. of the 20th Int'l Conf. on Distributed Computing Systems, 2000 DOI |
12 | M. A. Mazlan, A. Samsudin, and R. Budiarto, 'Secure Groups Communication for Mobile Agents Based on Public Key Infrastructure,' Proc. of the 9th Asia-Pacific Conf. on Communications (APCC 2003), 2003 DOI |
13 | H. J. Cho, G. S. Kim, K. C. Kim, H. S. Shim, and Y. I. Eom, 'Development of Lightweight Mobile Agent Platform for URC Environments,' Proc. of the 2nd Int'l Conf. on Ubiquitious Robots and Ambient Intelligence, 2005 |
14 | G. Cabri, L. Ferrari, and L. Leonardi, Applying security policies through agent roles: A JAAS based approach, Science of Computer Programming (Article in Press) DOI ScienceOn |
15 | R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Younman, 'Role-based access control model,' IEEE Trans. on Computer, Vol. 20(2), pp. 38-47, 1996 |
16 | G. Cabri, L.Ferrari, and F. Zambonelli, 'Role-Based Approaches for Engineering Interactions in Large-scale Multi-Agent System,' Post-Proc. of Advances in Software Engineering for Large-Scale Multiagent Systems(SELMAS 03), 2003 |