Using Agents for Secure Access to Data in the Internet
نویسنده
چکیده
Relatively few databases are accessible over the Internet. With today's technology one would like to encapsulate a database and make it available over the Internet. A client using such databases would browse an old census database, look-up for references in an object-oriented database system, access descriptions and pictures over the Internet, or combine di erent information using NCSA Mosaic, WWW, or back-end databases. The security issue mainly prevents greater access to a wide number of heterogeneous databases. We believe that this issue can only be addressed within an environment in which databases can be connected and used without violation of their security policies. This environment will ensure that all its component databases can be separately or in combination used without violation of the different security policies, local security policies (which relate to individual database components) and federated security policies (which relate to databases which are used in combination). DOK (Distributed Object Kernel) [9] is a project which is currently under development at RMIT (Royal Melbourne Institute of Technology). This project aims the design of a secure database middleware allowing users efIEEE Communications, June 1997, pp. 136{140. fective searching, updating and combining of information in distributed and heterogeneous environment. The DOK system is based on CORBA (Common Object Request Broker) [1] technology, the distributed-object standard developed by the OMG (Object Management Group), to communicate across different database platforms. In addition, DOK provides federated services allowing clients to use multiple databases in combination, and these involve query service [5], reengineering service [6], and re ection service. Other services, such as trader and transaction services, are currently under development. Our experience indicates that security issues are required to be considered at the beginning of the design of any element of a federated environment. In this paper we describe the main elements of the DOK system which allow the enforcement of federated security policies in the context of autonomous, distributed and heterogeneous databases. DOK uses security agents to maintain a DOK federation in a secure state. Di erent types of security agents are involved in the enforcement of security policies. Coordination agents are responsible for managing the whole federation and delegate functions to a more speci c agents, called task agents. By delegating the access of information of local databases to database agents, task agents are able to control any access to a federation by using speci c designed security procedures.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملنقش واسطه ای انگیزه های استفاده از اینترنت در رابطه بین سبک های دلبستگی و اعتیاد به اینترنت
The purpose of the present study was to examine the mediating role of internet usage motives in the relation between attachment styles and internet addiction. Statically society was all of Islamic Azad University Urmia Branch students, during 2015-2016 (1394-95.s.c.) and 204 participants were selected by multi-stage cluster sampling method and were asked to complete the Adult Attachment Invent...
متن کاملInternet Use by Faculty Members in Semnan University of Medical Sciences
Introduction. The universities attempt to facilitate the possibility of using the internet for faculty members by providing and expanding internet services. Since internet affects the quality of scientific researches at the university, it seems necessary to investigate the possibility and process of expanding the use of internet. This study was performed to investigate the use of internet among...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997