{"_id":"kKd5D5qxwsBsERNL2","bibbaseid":"navarroarribas-borrell-ortegaruiz-robles-accesscontrolwithsaferoleassignmentformobileagents-2005","authorIDs":["5e6808c6c1fce0de01000298","5e681c7bdfcfe3de010000da","5e681d86dfcfe3de010000f7","5e681e9fdfcfe3de01000123","5e681ff7dfcfe3de0100015b","5e68d55eae547ede01000241","FbhxrzRGHmB5ZLkdW","Rq2LaHi2k4LG2oJWA","XPSxWaR7aNza6tAag","bDunKxAWaFaoSZHTh","ep5R5PJemmENxrMNS","xepEiEC24XXQFT8fb"],"author_short":["Navarro-Arribas, G.","Borrell, J.","Ortega-Ruiz, J.","Robles, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["G."],"propositions":[],"lastnames":["Navarro-Arribas"],"suffixes":[]},{"firstnames":["J."],"propositions":[],"lastnames":["Borrell"],"suffixes":[]},{"firstnames":["J.A."],"propositions":[],"lastnames":["Ortega-Ruiz"],"suffixes":[]},{"firstnames":["S."],"propositions":[],"lastnames":["Robles"],"suffixes":[]}],"title":"Access Control with Safe Role Assignment for Mobile Agents","booktitle":"Proceedings of the Fourth International Joint Conference on Autonomous agents and Multi Agent Systems (AAMAS)","publisher":"ACM Press","year":"2005","editor":[{"firstnames":["F."],"propositions":[],"lastnames":["Dignum"],"suffixes":[]},{"firstnames":["V."],"propositions":[],"lastnames":["Dignum"],"suffixes":[]},{"firstnames":["S."],"propositions":[],"lastnames":["Koenig"],"suffixes":[]},{"firstnames":["S."],"propositions":[],"lastnames":["Kraus"],"suffixes":[]},{"firstnames":["M.P."],"propositions":[],"lastnames":["Singh"],"suffixes":[]},{"firstnames":["M."],"propositions":[],"lastnames":["Wooldridge"],"suffixes":[]}],"volume":"3","pages":"1235-1236","address":"Utrecht, The Netherlands","month":"July","abstract":"Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed data. They present specific restrictions, which make mobile agent systems one of the most feasible technologies to implement them. In this paper we propose a mechanism to safely assign roles to mobile agents and an access control method based in Role-based Access Control (RBAC). The access control method provides a simple, lightweight and distributed model for mobile agent applications. It provides a role system implemented with Simple Public Key Infrastructure (SPKI) certificates and uses the authorization model of SPKI for trust management.","keywords":"access control, mobile agents, security, SPKI","isbn":"1-59593-094-9","doi":"http://doi.acm.org/10.1145/1082473.1082710","acm":"http://portal.acm.org/citation.cfm?id=1082710&coll=Portal&dl=GUIDE&CFID=25110858&CFTOKEN=50126639","googlescholar-citedby":"3","note":"ISBN 1-59593-094-9, CORE(2008) A, CORE(2013) A*, CiteSeer VIP(2007) 0.02 (361/581)","bibtex":"@inproceedings{navarro-arribas05:_acces_contr_with_safe_role,\n author = {G. Navarro-Arribas and J. Borrell and J.A. Ortega-Ruiz and S.\n Robles},\n title = {Access Control with Safe Role Assignment for Mobile Agents},\n booktitle = {Proceedings of the Fourth International Joint Conference on\n Autonomous agents and Multi Agent Systems (AAMAS)},\n publisher = {ACM Press},\n year = 2005,\n editor = {F. Dignum and V. Dignum and S. Koenig and S. Kraus and M.P.\n Singh and M. Wooldridge},\n volume = 3,\n pages = {1235-1236},\n address = {Utrecht, The Netherlands},\n month = jul,\n abstract = {Mobile agent systems provide new perspectives for distributed\n e-commerce applications. Sea-of-Data (SoD) applications are\n those that need to process huge quantities of distributed\n data. They present specific restrictions, which make mobile\n agent systems one of the most feasible technologies to\n implement them. In this paper we propose a mechanism to safely\n assign roles to mobile agents and an access control method\n based in Role-based Access Control (RBAC). The access control\n method provides a simple, lightweight and distributed model\n for mobile agent applications. It provides a role system\n implemented with Simple Public Key Infrastructure (SPKI)\n certificates and uses the authorization model of SPKI for\n trust management.},\n keywords = {access control, mobile agents, security, SPKI},\n isbn = {1-59593-094-9},\n doi = {http://doi.acm.org/10.1145/1082473.1082710},\n acm =\n {http://portal.acm.org/citation.cfm?id=1082710&coll=Portal&dl=GUIDE&CFID=25110858&CFTOKEN=50126639},\n googlescholar-citedby =3,\n note = {ISBN 1-59593-094-9, CORE(2008) A, CORE(2013) A*, CiteSeer\n VIP(2007) 0.02 (361/581)},\n}\n\n","author_short":["Navarro-Arribas, G.","Borrell, J.","Ortega-Ruiz, J.","Robles, S."],"editor_short":["Dignum, F.","Dignum, V.","Koenig, S.","Kraus, S.","Singh, M.","Wooldridge, M."],"key":"navarro-arribas05:_acces_contr_with_safe_role","id":"navarro-arribas05:_acces_contr_with_safe_role","bibbaseid":"navarroarribas-borrell-ortegaruiz-robles-accesscontrolwithsaferoleassignmentformobileagents-2005","role":"author","urls":{},"keyword":["access control","mobile agents","security","SPKI"],"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"http://www.deic.uab.cat/~guille/fullbib.bib","creationDate":"2020-03-10T21:38:14.559Z","downloads":0,"keywords":["access control","mobile agents","security","spki"],"search_terms":["access","control","safe","role","assignment","mobile","agents","navarro-arribas","borrell","ortega-ruiz","robles"],"title":"Access Control with Safe Role Assignment for Mobile Agents","year":2005,"dataSources":["MhcFKWEyNPt5DaDvq"]}