Role-Based Access Control Models
Computer
Making Agents Secure on the Semantic Web
IEEE Internet Computing
Mobile Agents and Security
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
An administration concept for the enterprise role-based access control model
Proceedings of the eighth ACM symposium on Access control models and technologies
MDA Explained: The Model Driven Architecture: Practice and Promise
MDA Explained: The Model Driven Architecture: Practice and Promise
Service Agents and Virtual Enterprises: A Survey
IEEE Internet Computing
Developing multiagent systems: The Gaia methodology
ACM Transactions on Software Engineering and Methodology (TOSEM)
Adaptive Information: Improving Business Through Semantic Interoperability, Grid Computing, and Enterprise Integration (Wiley Series in Systems Engineering and Management)
Model-Based Design and Analysis of Permission-Based Security
ICECCS '05 Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
A BPMN Extension for the Modeling of Security Requirements in Business Processes
IEICE - Transactions on Information and Systems
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02
Adaptive Agent Model: an Agent Interaction and Computation Model
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02
A metamodel for agents, roles, and groups
AOSE'04 Proceedings of the 5th international conference on Agent-Oriented Software Engineering
Agile security using an incremental security architecture
XP'05 Proceedings of the 6th international conference on Extreme Programming and Agile Processes in Software Engineering
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Policies for role based agents in environments with changing ontologies
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
A collection of method fragments automated with model transformations in agent-oriented modeling
Engineering Applications of Artificial Intelligence
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Model-driven architecture (MDA) supports model-centred software development via successive model transformation. In MDA, the reusability of models is improved as well as the traceability of requirements. Agent-oriented model-driven architecture (AMDA) associates adaptive agents with a business-oriented interaction model and lets agents dynamically interpret their behaviour from the continuously maintained model via which the current business needs are deployed at runtime. The continuous re-interpretation rather than discrete re-transformation of models means immediate requirements deployment after re-configuration, no system down time being required to affect changes and results in a development process that is oriented to business experts rather than developers. Adopting the adaptive agent model, an AMDA paradigm, we put forward a security-aware model-driven mechanism by using an extension of the role-based access control (RBAC) model. For this purpose, the concept of agent role proposed in agent-oriented software engineering (AOSE) is integrated with the one proposed in RBAC. Agent duties are specified in an interaction model and describe the roles that agents can play to fulfil their functional responsibilities. Agent rights are specified in a security policy rule model attached to the interaction model and describe constraints upon agent capabilities caused by their associated social roles. The role-based interaction and policy-driven model incorporates both agent rights and duties. Hence, functional requirements and non-functional security constraint requirements are put together, related by the concept of role. Consequently, agents can continuously use the re-configurable model to play their roles in order to fulfil their responsibilities, and at the same time respect the security constraints. The major contribution from the approach is a method for building adaptive and secure MAS, following model-driven architecture. The approach is illustrated with an actual British railway management system.