Role-Based Access Control Models
Computer
Agent UML: a formalism for specifying multiagent software systems
First international workshop, AOSE 2000 on Agent-oriented software engineering
Designing Security Agents for the DOK Federated System
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
So Far (Schematically) yet So Near (Semantically)
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5)
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02
Engineering JADE agents with the Gaia methodology
NODe'02 Proceedings of the NODe 2002 agent-related conference on Agent technologies, infrastructures, tools, and applications for E-services
Hi-index | 0.00 |
This proposition deals with interoperation of data and security policies in cooperative information systems. We use the agent paradigm for the treatment of distributed programs and perform complex tasks through cooperation and interactions. A combination of two methods -- GAIA and AUML-- and a set of models are used. Two protocols are defined related to the features of the system: (i) a knowledge management protocol to address interoperability problems between different modes of data representation and security access models and, to generate the matches between these models, (ii) a query resolution protocol using global knowledge. Agents are described in their goals, their interactions, their knowledge by defining their roles for each protocol, including the key role of the security mediator. A prototype is implemented on the JADE platform (Java Agent Development Environment).