Filters








18 Hits in 1.9 sec

WSSecSpaces

Roberto Lucchi, Gianluigi Zavattaro
2004 Proceedings of the 2004 ACM symposium on Applied computing - SAC '04  
Web Services in order to complete a specific task.  ...  In this paper we discuss the design and the implementation of a higherlevel interaction model for Web Services that follows the tradition of data-driven coordination: Web Services do not coordinate via  ...  This extended pattern matching mechanism is borrowed from SecSpaces [6] , a data-driven coordination model designed for supporting security properties also in the context of open applications.  ... 
doi:10.1145/967900.968001 dblp:conf/sac/LucchiZ04 fatcat:cau5w6aw5zhhbpyz4aqhynah4i

Combining Partitions in SecSpaces

Mario Bravetti, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro
2004 Electronical Notes in Theoretical Computer Science  
SecSpaces is a data-driven coordination model that supports a tuple-based coordination space extended with mechanisms for controlling and authenticating the access to entries.  ...  We formally define, in terms of a process calculus, this notion and we demonstrate the flexibility of this new mechanism via examples.  ...  In previous papers [1, 2] we have already proved that some security properties in the interaction among processes can be guaranteeted.  ... 
doi:10.1016/j.entcs.2004.02.002 fatcat:mo6izsfss5grdgjphcns7o3hea

Secure shared data-space coordination languages: A process algebraic survey

Riccardo Focardi, Roberto Lucchi, Gianluigi Zavattaro
2006 Science of Computer Programming  
In this context, where programs may run in an untrusted environment, new challenges come into play such as to provide a means to support security.  ...  In this paper we outline the most significant security threats emerging in this context and we present a survey, in a process algebraic setting, of the most interesting shared data-space coordination languages  ...  The approach exploits a combination of static and dynamic type checking.  ... 
doi:10.1016/j.scico.2005.07.011 fatcat:gnirkgkvkrfyrptqldso3qexkq

Data Driven Language for Agents Secure Interaction [chapter]

Mahdi Zargayouna, Flavien Balbo, Serge Haddad
2010 Lecture Notes in Computer Science  
This paper discusses the security issues in data driven coordination languages. These languages rely on a data space shared by the agents and used to coordinate their activities.  ...  We extend these languages with a main distinguishing feature, which is the possibility to define fine-grained security conditions, associated with every datum in the shared space.  ...  Following the data driven approach, any agent can read/remove any tuple stored in the tuplespace simply by exploiting formal fields (variables) [1] , which act as wildcards [5] .  ... 
doi:10.1007/978-3-642-13338-1_5 fatcat:kzznptjazjfa3eyk37yhkq56sy

Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

Matthew L. Hale, Rose F. Gamble
2017 Requirements Engineering  
to use in conjunction with formal methods and service agreements for accreditation.  ...  The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents.  ...  Acknowledgements This material is based on research sponsored in part by the Air Force Office of Scientific Research (AFOSR), under Agreement No. FA-9550-09-1-0409.  ... 
doi:10.1007/s00766-017-0287-5 fatcat:2o2ynjgo3reqnkb4o57zxnb3ce

Architecting Security with Paradigm [chapter]

Suzana Andova, Luuk P. J. Groenewegen, Jan H. S. Verschuren, Erik P. de Vink
2009 Lecture Notes in Computer Science  
In addition, translating the Paradigm models into process algebra brings model checking within reach. Security properties of the examples discussed, are formally verified with the model checker mCRL2.  ...  For large security systems a clear separation of concerns is achieved through architecting.  ...  We are grateful to Tim Willemse for advice on the use of the mCRL2 toolkit and to the ADS6-reviewers for their constructive comments.  ... 
doi:10.1007/978-3-642-10248-6_11 fatcat:ueix76yff5efbimmaykxjvtm7u

Secondary use of data in EHR systems [article]

Fan Yang, Chris Hankin, Flemming Nielson, Hanne Riis Nielson
2012 arXiv   pre-print
The main challenge is how to enforce various types of security policies, in particular predictive access control policies - policies based on the future behavior of a program.  ...  A novel feature of our approach is that advice is able to analyze the future use of data.  ...  We would like to thank Hidehiko Masuhara and Tomoyuki Aotani for working with us in AspectKE*, and for their comments on the paper.  ... 
arXiv:1201.4262v1 fatcat:rtcttfuoezd2xa5o4cf2cjnw5i

Agent Coordination Contexts for the formal specification and enactment of coordination and security policies

Andrea Omicini, Alessandro Ricci, Mirko Viroli
2006 Science of Computer Programming  
This language is shown to be useful to specify and enact integrated policies for security and coordination in MAS. (A. Omicini), aricci@deis.unibo.it (A. Ricci), mirko.viroli@unibo.it (M. Viroli).  ...  The notion of ACC features some key properties that help abating system complexity, that is, (i) it works as both a coordination and a security abstraction, (ii) it covers the engineering process from  ...  Coordination Network for Agentbased Computing".  ... 
doi:10.1016/j.scico.2005.07.014 fatcat:t3a3w5klvfhmfp36k4yuur5aea

Security Issues in the Tuple-Space Coordination Model [chapter]

Mario Bravetti, Nadia Busi, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro
Formal Aspects in Security and Trust  
Then we describe SecSpaces, a tuple-space based language, which supports secure coordination in untrusted environments.  ...  We present some security issues that emerge when the tuple-space coordination model is used in open systems.  ...  Conclusion We have described the main security issues that emerge when Linda is used in open systems and described SecSpaces that make it possible to support some of the main security properties (e.g.,  ... 
doi:10.1007/0-387-24098-5_1 dblp:conf/ifip1-7/BravettiBGLZ04 fatcat:wvnqm6ruj5axdiuhiig2ld5kum

Dynamic management of capabilities in a network aware coordination language

Daniele Gorla, Rosario Pugliese
2009 The Journal of Logic and Algebraic Programming  
Hence, access requests are (mostly) checked statically, which is an advantage with respect to more traditional approaches to system security.  ...  We introduce a capability-based access control model integrated into a linguistic formalism for modeling network aware systems and applications.  ...  Acknowledgements We thank the anonymous reviewers for fruitful comments that helped in improving the paper.  ... 
doi:10.1016/j.jlap.2008.12.001 fatcat:x3pbzoaevrgp5ct7adef4b2qum

Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation

Abraham Esquivel, Pablo Haya, Xavier Alamán
2015 Sensors  
benefit for the community.  ...  Our privacy solution deals with user's privacy as a tradable good for obtaining environmental services. Thus, users gain access to more valuable services as they share more personal information.  ...  Acknowledgments The work reported in this paper was partially funded by the Spanish "Ministerio de Economía y Competitividad" (Project TIN2013-44586-R) and by the "Comunidad Autonoma de Madrid" (Project  ... 
doi:10.3390/s150614207 pmid:26087373 pmcid:PMC4507695 fatcat:fiqplp6vrna73pibhgjxppaghe

A Dependable Infrastructure for Cooperative Web Services Coordination

Eduardo Adilio Pelinson Alchieri, Alysson Neves Bessani, Joni da Silva Fraga
2010 International Journal of Web Services Research  
His research interests include distributed computing systems, algorithms, security and fault tolerance in distributed systems.  ...  Following this tendency, this work presents a dependable (i.e., intrusion-tolerant) infrastructure for cooperative web services coordination that is based on the tuple space coordination model.  ...  The server-side is similar, except that there is a new layer to check the access policy for each operation requested.  ... 
doi:10.4018/jwsr.2010040103 fatcat:dot4wihtpvadxnokktsgoe5due

A Dependable Infrastructure for Cooperative Web Services Coordination

Eduardo Adilio Pelinson Alchieri, Alysson Neves Bessani, Joni da Silva Fraga
2008 2008 IEEE International Conference on Web Services  
His research interests include distributed computing systems, algorithms, security and fault tolerance in distributed systems.  ...  Following this tendency, this work presents a dependable (i.e., intrusion-tolerant) infrastructure for cooperative web services coordination that is based on the tuple space coordination model.  ...  The server-side is similar, except that there is a new layer to check the access policy for each operation requested.  ... 
doi:10.1109/icws.2008.54 dblp:conf/icws/AlchieriBF08 fatcat:ub3hs3cqxjeyvb5u5e7qa4tafy

Web Services for E-commerce

Mario Bravetti, Roberto Lucchi, Gianluigi Zavattaro, Roberto Gorrieri
2004 Proceedings of the 2004 ACM symposium on Applied computing - SAC '04  
(ii) security access control to Web Services and (iii) a mechanism for distributing service invocations among several Web Services implementing (at different efficiency levels) the same task.  ...  The proposal is formalized by employing a coordination platform, which is a probabilistic extension of the existing WSSecSpaces.  ...  To pursue this goal, we intend to follow the approach reported in [12] , where a process algebra is proposed as a framework to be used for the formal modeling and verification of e-barter systems (multi-agent  ... 
doi:10.1145/967900.968065 dblp:conf/sac/BravettiLZG04 fatcat:x4hd4ckn7rbp5axnag7jbyrhdy

Probabilistic and Prioritized Data Retrieval in the Linda Coordination Model [chapter]

Mario Bravetti, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro
2004 Lecture Notes in Computer Science  
Linda tuple spaces are flat and unstructured, in the sense that they do not allow for expressing preferences of tuples; for example, we could be interested in indicating tuples that should be returned  ...  Regarding priorities, we present two possible ways for adding them to Linda; in the first one the order of priorities is statically fixed, in the second one it is dynamically instantiated when a data-retrieval  ...  In terms of security properties, this corresponds to a form of secure group communication.  ... 
doi:10.1007/978-3-540-24634-3_7 fatcat:7zfgap4uazdhlkvctgsx624q4y
« Previous Showing results 1 — 15 out of 18 results