DOC PREVIEW
UConn CSE 298/300 - Agent Approaches to Role Based Security

This preview shows page 1-2-3-24-25-26 out of 26 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Agent Approaches to Role-Based SecurityOverview of PresentationDistributed and Web-Based ApplicationsSoftware Agent Computing ParadigmSlide 5Influence of Previous and Related WorkSlide 7Architecture for Baseline Agent ApproachComponents and AgentsSlide 10User Agent (UA)Information Retrieval Agent (IRA)Object Security Agent (OSA)Architecture for Hierarchical Agent ApproachSlide 15IRA ProcessingSlide 17Architecture for Object-Security Manager Agent ApproachOSA ManagerAglets - Java AgentsArchitecture for Agent ImplementationVersion of Baseline ApproachIllustration of Aglet Interaction CodeSlide 24Bitmap from Experimental PrototypeConcluding RemarksCSE300Agent-1.1Agent Approaches to Role-Based SecurityAgent Approaches to Role-Based SecurityS. Demurjian, Y. He, T.C. Ting, and M. SabaComputer Science & Engineering DepartmentThe University of ConnecticutStorrs, Connecticut 06269-3155{steve, ting, saba}@engr.uconn.eduhttp://www.engr.uconn.edu/~steve(860) 486 - 4818Work Presented Herein atWork Presented Herein atIFIP WG 11.3 13th Conference on DatabaseIFIP WG 11.3 13th Conference on DatabaseSecurity, Seattle, WA, 1999.Security, Seattle, WA, 1999.CSE300Agent-1.2Overview of PresentationOverview of PresentationBackground and MotivationBackground and MotivationDistributed and Web Based ApplicationsSoftware Agent Computing ParadigmPrevious and Related WorkAgent Approaches to Role-Based SecurityAgent Approaches to Role-Based SecurityExperimental Prototype via Java Aglets Experimental Prototype via Java Aglets Concluding Remarks and Future WorkConcluding Remarks and Future WorkCSE300Agent-1.3Distributed and Web-Based ApplicationsDistributed and Web-Based ApplicationsUtilize New and Existing Info. InnovativelyUtilize New and Existing Info. InnovativelyDistributed/Web-Based Applications are:Distributed/Web-Based Applications are:Combo of Legacy, COTS, DBs, New C/SElectronic Banking/CommerceInformation Dissemination (Push/Pull)Leverage Computing and Network ResourcesLeverage Computing and Network ResourcesTranscend Available AlternativesTranscend Available AlternativesMAC, DAC, Role-BasedEmploy as “Local” Solutions?New Computing Paradigms EmergingNew Computing Paradigms EmergingSoftware AgentsVarious ImplementationsCSE300Agent-1.4Software Agent Computing ParadigmSoftware Agent Computing ParadigmWhat is an Agent?What is an Agent?Acts on Behalf of Individuals(Users) on TaskState and Behavior in Runtime EnvironmentFour Mandatory PropertiesFour Mandatory PropertiesSense/React to Environment ChangesAutonomously Control Own State/BehaviorProactive to Specific User GoalsConstantly Executing in Runtime EnvironmentStationary Agent: Limited to Single NodeStationary Agent: Limited to Single NodeMobile Agent: Migrate Across Network to Mobile Agent: Migrate Across Network to Accomplish Required TasksAccomplish Required TasksCSE300Agent-1.5Software Agent Computing ParadigmSoftware Agent Computing ParadigmAgents Akin to ObjectsAgents Akin to ObjectsCreated and DestroyedInteract by Passing MessagesRemote Method Invocation ProhibitedAttractiveness of Agents for SecurityAttractiveness of Agents for SecurityAgents Created by Client to Carry Out Secure Access to Remote ClientsVisit Multiple Nodes to Satisfy “Request”Specificity of Role Dictates Agent BehaviorCaveat: Mobile Agents Significant Security Caveat: Mobile Agents Significant Security Concern Due to Potential Ability to Act as Threat!Concern Due to Potential Ability to Act as Threat!CSE300Agent-1.6Influence of Previous and Related WorkInfluence of Previous and Related WorkOur Previous Efforts inOur Previous Efforts inSoftware Architectural Alternatives with Limited DistributionJava’s Impact and Potential on Distributed Computing/SecurityRelated work by Related work by Hale 1998Secure Distributed Object and Language Programming Framework for Internet-Based Apps.Tari 1998Distributed Object Kernel as Framework to Design and Implement Distributed Security PoliciesCSE300Agent-1.7Agent Approaches to Role-Based SecurityAgent Approaches to Role-Based SecurityDistributed/Web-Based Applications to Access Distributed/Web-Based Applications to Access Remote Objects of Legacy, COTs, DBs, C/S, etc.Remote Objects of Legacy, COTs, DBs, C/S, etc.Orthogonal GoalsOrthogonal GoalsSecurity to Control/Limit InteractionsDistributed/Web-Based Computing to Enable Interoperation/Facilitate AccessPropose and Discuss Three Agent ArchitecturesPropose and Discuss Three Agent ArchitecturesBaseline Agent ApproachHierarchical Agent ApproachObject-Security Manager Agent ApproachAssume a Role-Based Context, but Other Security Assume a Role-Based Context, but Other Security Approaches may also ApplyApproaches may also ApplyCSE300Agent-1.8Architecture for Baseline Agent ApproachArchitecture for Baseline Agent ApproachClientApplicationUAIRAIRAOSAObjectClientServerKey: UA: User Agent IRA: Information Retrieval Agent OSA: Object Security AgentCSE300Agent-1.9Components and AgentsComponents and AgentsClient Application (CA)Client Application (CA)GUI/Software Tool for UserUser Limited to Single Role at Any TimeRole/User Request Passed to UAUsers Modify Single Remote Object/RequestCA Manages Multiple Requests in SerialUser Agent (UA)User Agent (UA)Stationary Agent Created by CA for UserUA Receives Request from CAUA Transforms Request and Creates IRAUA Forwards Request to IRA and Waits UA Receives Response for IRA and Transforms for Return to CACSE300Agent-1.10Components and AgentsComponents and AgentsInformation Retrieval Agent (IRA)Information Retrieval Agent (IRA)Mobile Agent Created by UALimited to Interacting with UA and OSAIRA Created and Dispatched by UAIRA Moves from Client to Server to ClientInteract with Remote Object and Return ResultObject Security Agent (OSA)Object Security Agent (OSA)Stationary Agent (or Collection of Security Objects) or a Mobile AgentEnforce Security Policy for Remote ObjectBased on Permissible Actions by RoleObjectObjectRemote Object Provides Services to CACSE300Agent-1.11User Agent (UA)User Agent (UA)UA Arbitrates Interaction of CA and IRAUA Arbitrates Interaction of CA and IRAUA Allocation StrategiesUA Allocation StrategiesUser-Based Allocation (UBA)UA Dedicated to Each User, Created Upon Login, Lives During


View Full Document

UConn CSE 298/300 - Agent Approaches to Role Based Security

Documents in this Course
Java Tool

Java Tool

58 pages

Load more
Download Agent Approaches to Role Based Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Agent Approaches to Role Based Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Agent Approaches to Role Based Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?