International audienceDistributed Computing shows a fast development, that makes sharing and diffusion of information more easier than before. However, ignoring to adopt a well defined security policy exposes the information system to serious damages and a wide variety of attacks. In this paper, we propose a new conception of access control where subjects and entities are modeled by autonomous mobile agents. Features of these later are combined with cryptographic mechanisms such as resistant-MITM Diffie-Hellman Key Exchange and digital signature, symmetric and elliptic curve encryption, as well as one-way hash functions. We have implemented the proposed scheme and conducted detailed experiments to evaluate the security and effectiveness of our scheme