Filters








378,873 Hits in 3.9 sec

Coordinating processes with secure spaces

Jan Vitek, Ciarán Bryce, Manuel Oriol
2003 Science of Computer Programming  
Linda processes communicate by reading and writing messages in a globally visible data space, so a malicious process can launch any number of security attacks.  ...  This paper presents the design of a new coordination model which extends Linda with ÿne-grained access control. The semantics of the model is presented in the context of a process calculus.  ...  Coordination with secure spaces In this paper we present a coordination model, referred to as secure spaces, which extends Linda with ÿne-grained access control to the shared data space.  ... 
doi:10.1016/s0167-6423(02)00090-4 fatcat:vmcgqgxsxjeszm75ttad4ropxi

Securing a Space-Based Service Architecture with Coordination-Driven Access Control

Stefan Craß, Tobias Dönz, Gerson Joskowicz, eva Kühn, Alexander Marek
2013 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Space-based middleware enables data-driven coordination for these processes via shared tuple spaces that allow a decoupled form of communication.  ...  To enable the secure collaboration of different participants, a suitable security concept for space-based services is required.  ...  Acknowledgments The work is funded by the Austrian Government under the programs FFG FIT-IT, project 825750 Secure Space, and FFG Bridge, project 834162 LOPONODE Middleware.  ... 
doi:10.22667/jowua.2013.03.31.076 dblp:journals/jowua/CrassDJKM13 fatcat:or4esqdvwvdbjl5nvohajkaqna

A novel algorithm for secure and reliable coordinator election in distributed networks

Shital Subhashchandra Supase, Rajesh Baliram Ingle
2021 International Journal of Advanced Technology and Engineering Exploration  
The unreliable communication channel used in message passing makes the election algorithm vulnerable to security attacks [7, 8] The unauthorized access may result in a security and privacy attack which  ...  Different consensus algorithms exist for electing an entity as a coordinator and those are generally termed as coordinator election algorithms.  ...  SRCEA elects a reliable coordinator with O(n) communication complexity and space complexity with considerably less computation cost.  ... 
doi:10.19101/ijatee.2021.874588 fatcat:5gdrzqt6tvdb3dt4fl42dqlyw4

Foreword

Daniel Le Métayer
2000 Theoretical Computer Science  
Jagannathan describes a new language and coordination model based on the integration into a simple untyped -calculus of an address space with the associated operations (such as the creation of a new thread  ...  on a given address space).  ... 
doi:10.1016/s0304-3975(99)00225-x fatcat:wasbiikkurcbbkearbh4gtrmtq

Chaotic Image Encryption with Random Shuffling of Data

Murat Aydos, Alper Ugur
2014 Pamukkale University Journal of Engineering Sciences  
Hence, image encryption process must be chosen not only to satisfy the security goals but also to fulfill these requirements.  ...  Recently, the studies are concentrated on some weaknesses of chaotic algorithms and most of the presented solutions came up with complex structured chaotic maps.  ...  key space and low security level in image encryption process.  ... 
doi:10.5505/pajes.2014.18209 fatcat:ceoosyhrtjhgtbssim6p43wnca

WSSecSpaces

Roberto Lucchi, Gianluigi Zavattaro
2004 Proceedings of the 2004 ACM symposium on Applied computing - SAC '04  
direct service invocation, but their interaction is mediated by a coordination space where shared data are stored and retrieved.  ...  Moreover, our proposal extends the traditional data-driven coordination model with a more sophisticated pattern matching mechanism that supports a controlled access to the shared data.  ...  In particular, three main aspects have attracted the attention of the coordination community: i) security in coordination; ii) integration of Linda with Web technologies (e.g., XML); iii) coordination  ... 
doi:10.1145/967900.968001 dblp:conf/sac/LucchiZ04 fatcat:cau5w6aw5zhhbpyz4aqhynah4i

Secure shared data-space coordination languages: A process algebraic survey

Riccardo Focardi, Roberto Lucchi, Gianluigi Zavattaro
2006 Science of Computer Programming  
In this paper we outline the most significant security threats emerging in this context and we present a survey, in a process algebraic setting, of the most interesting shared data-space coordination languages  ...  Shared data-space coordination languages, which provide a means to program interactions between decoupled entities abstracting away from their internal behavior, represent a powerful framework for programming  ...  The threat in this case is that a malicious process can interfere with the entities which collaborate by using the space TS.  ... 
doi:10.1016/j.scico.2005.07.011 fatcat:gnirkgkvkrfyrptqldso3qexkq

Agent Coordination Contexts for the formal specification and enactment of coordination and security policies

Andrea Omicini, Alessandro Ricci, Mirko Viroli
2006 Science of Computer Programming  
The notion of ACC features some key properties that help abating system complexity, that is, (i) it works as both a coordination and a security abstraction, (ii) it covers the engineering process from  ...  interactions of the agent with its environment.  ...  A Coordination Network for Agentbased Computing".  ... 
doi:10.1016/j.scico.2005.07.014 fatcat:t3a3w5klvfhmfp36k4yuur5aea

Triple Space Computing: Adding Semantics to Space-Based Computing [chapter]

Johannes Riemer, Francisco Martin-Recuerda, Ying Ding, Martin Murth, Brahmananda Sapkota, Reto Krummenacher, Omair Shafiq, Dieter Fensel, Eva Kühn
2006 Lecture Notes in Computer Science  
In this paper, we propose Triple Space Computing as a new communication and coordination framework for Semantic Web and Semantic Web Services.  ...  Corso offers maximum scalability and flexibility by allowing applications to communicate with one another via common distributed persistent "spaces of objects".  ...  Acknowledgement The work was supported by the Austrian Federal Ministry for Transport, Innovation, and Technology under the FIT-IT Semantic Systems project Triple Space Computing (TSC 809249).  ... 
doi:10.1007/11836025_30 fatcat:ivsd2braqjaglkefn3ri5far64

The Spacetub Models and Framework [chapter]

Robert Tolksdorf, Gregor Rojec-Goldmann
2002 Lecture Notes in Computer Science  
# $ % is a framework to model a variety of coordination languages from the & ( ') 0 family and a testbed for experimentation with them.  ...  In this work, we analyse a set of coordination languages wrt. several criteria and try to detect similarities and differences.  ...  Design Our framework was inspired by 's rules for the definition of security policies. We define a coordination language with a set of rules.  ... 
doi:10.1007/3-540-46000-4_32 fatcat:h7ctrjrrfjfwvhkxd7vryttip4

Data Driven Language for Agents Secure Interaction [chapter]

Mahdi Zargayouna, Flavien Balbo, Serge Haddad
2010 Lecture Notes in Computer Science  
This paper discusses the security issues in data driven coordination languages. These languages rely on a data space shared by the agents and used to coordinate their activities.  ...  We extend these languages with a main distinguishing feature, which is the possibility to define fine-grained security conditions, associated with every datum in the shared space.  ...  In data driven coordination languages, security is generally enforced by using multiple (logical) spaces or by stating "Interaction Laws". With multiple spaces (e.g.  ... 
doi:10.1007/978-3-642-13338-1_5 fatcat:kzznptjazjfa3eyk37yhkq56sy

New approach to defining the term Space Traffic Management based on linguistic analysis

Dominik Mrna, Michal Hruz
2021 Transportation Research Procedia  
This paper deals with a new approach to defining the term Space Traffic management.  ...  Abstract This paper deals with a new approach to defining the term Space Traffic management.  ...  is a process of control, monitoring and coordination of space traffic with a view to achieve safe operational environment without collisions and interference and with reliable collision avoidance system  ... 
doi:10.1016/j.trpro.2021.06.036 fatcat:faneq5oqjzdjxaojdsjv25ic6i

Cybercrime Regulation through Laws and Strategies: A Glimpse into the Indian Experience

Annappa Nagarathna
2020 International Journal of Digital Law  
This Act underwent amendment in 2008 to accommodate provisions essential to regulate cybercrimes as well as protect data and privacy on cyber space.  ...  In addition to the law, other strategies were designed and adopted to better regulate cyber offences including announcing cyber security policies, constituting institutions to take care of certain concerns  ...  . 4) To implement Cyber Crisis Management Plan for dealing with cyber related incidents impacting critical national processes or endangering public safety and security of the Nation, by way of well coordinated  ... 
doi:10.47975/ijdl/1nagarathna fatcat:7krsbtgec5fx3ju3wexehmchsq

Towards Access Control for Isolated Applications

Kirill Belyaev, Indrakshi Ray
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
with each other in a regulated and secure manner.  ...  With the advancements in contemporary multi-core CPU architectures, it is now possible for a server operating system (OS), such as Linux, to handle a large number of concurrent application services on  ...  Coordination is performed exclusively through control tuples. Security Aspects We focus on the confidentiality, integrity, and availability issues with respect to tuple space implementation.  ... 
doi:10.5220/0005970001710182 dblp:conf/secrypt/BelyaevR16 fatcat:x52coqttibfqtdekiujsmouiqa

Formal Specification and Enactment of Security Policies through Agent Coordination Contexts

Andrea Omicini, Alessandro Ricci, Mirko Viroli
2003 Electronical Notes in Theoretical Computer Science  
Accordingly, we show that process algebras are a suitable tool for both specification and enactment of security and coordination policies through ACCs.  ...  By focussing on multi-agent systems, we discuss the notion of Agent Coordination Context (ACC) as an abstraction that (i) works as an organization and security abstraction, (ii) integrates well with abstractions  ...  Security represents a dual aspect with respect to coordination: as discussed in [11] , coordination is in some sense the constructive counterpart of security in the dynamics of interaction.  ... 
doi:10.1016/s1571-0661(04)80682-0 fatcat:3qns73o63vehvfdwjutfffw5ea
« Previous Showing results 1 — 15 out of 378,873 results