{"title":"Access control in mobile databases using mobile agents","authors":"A. Sedaghati, A. B. Dastjerdi","doi":"10.1109/ICOS.2012.6417642","DOIUrl":null,"url":null,"abstract":"The popularity of mobile devices has made them lovely targets for malicious code developers; and these attacks to mobile devices, are growing day by day. In comparison to fixed environments, mobility has its special features and limitations, like frequently disconnections and user's movement, that affect security mechanisms. They delay user's access to his data; and this delay can lead to change in access conditions. Therefore, Access control mechanisms must cover these changes dynamically. In this paper we use both mobile agents and role based access control in form of capability lists, to introduce a dynamic access control mechanism.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Conference on Open Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOS.2012.6417642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The popularity of mobile devices has made them lovely targets for malicious code developers; and these attacks to mobile devices, are growing day by day. In comparison to fixed environments, mobility has its special features and limitations, like frequently disconnections and user's movement, that affect security mechanisms. They delay user's access to his data; and this delay can lead to change in access conditions. Therefore, Access control mechanisms must cover these changes dynamically. In this paper we use both mobile agents and role based access control in form of capability lists, to introduce a dynamic access control mechanism.