If only I can trust my police! SIM : an agent-based audit solution of access right deployment through open network

Christophe Incoul, Benjamin Gateau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

449 Downloads (Pure)

Abstract

Dynamic and evolved environment make the Information Systems (IS), and consequently access rights to its components, always more complex to define and to manage. To bring up a contribution for improving that matter, our paper's first objective is to realize the development of an automated deployment of policies from an administrative platform that encompasses business requirements down to infrastructure's components and devices. This objective is achieved by adapting the XACML OASIS framework [22] and by formalizing a protocol for information exchange through different components of a multi-agent system. The second paper's objective aims at providing guaranties that defined and deployed access rights are continuously aligned with business requirements. This objective is completed by complementary developments that aim to perform a systematic and/or on-demand audit of the effective rights against the desired ones. This second objective is achieved by adding new functionality to the proposed agents architecture and by adapting the protocol accordingly. Practically, this research has been performed in the framework of the SIM [1] project and has privileged free and open source components for the prototyping phase.
Original languageEnglish
Title of host publicationProceedings of International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), Tozeur, Tunisia
Pages85-92
Number of pages8
DOIs
Publication statusPublished - 2008

Keywords

  • multi agent architecture.
  • Responsibility model
  • Policy audit
  • Identity Management

Fingerprint

Dive into the research topics of 'If only I can trust my police! SIM : an agent-based audit solution of access right deployment through open network'. Together they form a unique fingerprint.

Cite this