OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment

Sidra Aslam, Mansoor Ahmed, Imran Ahmed, Abid Khan, Awais Ahmad, Muhammad Imran, Adeel Anjum, Shahid Hussain

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


Access control is used to prevent data from access of unauthorized users. Over the years, several access control models have been proposed to meet requirements of various applications and domains. Role-based access control model is one such model which enforces security based on the roles. However, role-based access control model is static in nature and does not provide the dynamism of collaboration required in the multi-domain environment. This paper presents an Ontology-Based Access Control (OBAC) model, which provides a solution by using an ontology-based approach. In OBAC model, agents are used for the identification and classification of Roles, Objects and Permissions (ROP) in distributed environment. The proposed method exploits the ontology-based approach, where agent learns and adapts changes to identify roles, objects and permissions from a given dataset and classify them into ontology according to rules and policies. The proposed ontology also provides extensibility and reusability. Moreover, we simulated our technique on datasets of two different domains. The first dataset is related to the university environment and the second one is about hospital domain. The promising experimental results indicates the effectiveness of proposed approach.

Original languageEnglish
Pages (from-to)34363-34384
Number of pages22
JournalMultimedia Tools and Applications
Issue number45-46
Publication statusPublished - Dec 2020
Externally publishedYes


  • Access Control
  • Agent
  • Distributed Systems
  • Objects
  • Ontology
  • Permissions
  • Role
  • Role-Based Access Control
  • Semantic Web


Dive into the research topics of 'OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment'. Together they form a unique fingerprint.

Cite this