A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Coordinating processes with secure spaces
2003
Science of Computer Programming
Linda processes communicate by reading and writing messages in a globally visible data space, so a malicious process can launch any number of security attacks. ...
This paper presents the design of a new coordination model which extends Linda with ÿne-grained access control. The semantics of the model is presented in the context of a process calculus. ...
Coordination with secure spaces In this paper we present a coordination model, referred to as secure spaces, which extends Linda with ÿne-grained access control to the shared data space. ...
doi:10.1016/s0167-6423(02)00090-4
fatcat:vmcgqgxsxjeszm75ttad4ropxi
Securing a Space-Based Service Architecture with Coordination-Driven Access Control
2013
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Space-based middleware enables data-driven coordination for these processes via shared tuple spaces that allow a decoupled form of communication. ...
To enable the secure collaboration of different participants, a suitable security concept for space-based services is required. ...
Acknowledgments The work is funded by the Austrian Government under the programs FFG FIT-IT, project 825750 Secure Space, and FFG Bridge, project 834162 LOPONODE Middleware. ...
doi:10.22667/jowua.2013.03.31.076
dblp:journals/jowua/CrassDJKM13
fatcat:or4esqdvwvdbjl5nvohajkaqna
A novel algorithm for secure and reliable coordinator election in distributed networks
2021
International Journal of Advanced Technology and Engineering Exploration
The unreliable communication channel used in message passing makes the election algorithm vulnerable to security attacks [7, 8] The unauthorized access may result in a security and privacy attack which ...
Different consensus algorithms exist for electing an entity as a coordinator and those are generally termed as coordinator election algorithms. ...
SRCEA elects a reliable coordinator with O(n) communication complexity and space complexity with considerably less computation cost. ...
doi:10.19101/ijatee.2021.874588
fatcat:5gdrzqt6tvdb3dt4fl42dqlyw4
Foreword
2000
Theoretical Computer Science
Jagannathan describes a new language and coordination model based on the integration into a simple untyped -calculus of an address space with the associated operations (such as the creation of a new thread ...
on a given address space). ...
doi:10.1016/s0304-3975(99)00225-x
fatcat:wasbiikkurcbbkearbh4gtrmtq
Chaotic Image Encryption with Random Shuffling of Data
2014
Pamukkale University Journal of Engineering Sciences
Hence, image encryption process must be chosen not only to satisfy the security goals but also to fulfill these requirements. ...
Recently, the studies are concentrated on some weaknesses of chaotic algorithms and most of the presented solutions came up with complex structured chaotic maps. ...
key space and low security level in image encryption process. ...
doi:10.5505/pajes.2014.18209
fatcat:ceoosyhrtjhgtbssim6p43wnca
WSSecSpaces
2004
Proceedings of the 2004 ACM symposium on Applied computing - SAC '04
direct service invocation, but their interaction is mediated by a coordination space where shared data are stored and retrieved. ...
Moreover, our proposal extends the traditional data-driven coordination model with a more sophisticated pattern matching mechanism that supports a controlled access to the shared data. ...
In particular, three main aspects have attracted the attention of the coordination community: i) security in coordination; ii) integration of Linda with Web technologies (e.g., XML); iii) coordination ...
doi:10.1145/967900.968001
dblp:conf/sac/LucchiZ04
fatcat:cau5w6aw5zhhbpyz4aqhynah4i
Secure shared data-space coordination languages: A process algebraic survey
2006
Science of Computer Programming
In this paper we outline the most significant security threats emerging in this context and we present a survey, in a process algebraic setting, of the most interesting shared data-space coordination languages ...
Shared data-space coordination languages, which provide a means to program interactions between decoupled entities abstracting away from their internal behavior, represent a powerful framework for programming ...
The threat in this case is that a malicious process can interfere with the entities which collaborate by using the space TS. ...
doi:10.1016/j.scico.2005.07.011
fatcat:gnirkgkvkrfyrptqldso3qexkq
Agent Coordination Contexts for the formal specification and enactment of coordination and security policies
2006
Science of Computer Programming
The notion of ACC features some key properties that help abating system complexity, that is, (i) it works as both a coordination and a security abstraction, (ii) it covers the engineering process from ...
interactions of the agent with its environment. ...
A Coordination Network for Agentbased Computing". ...
doi:10.1016/j.scico.2005.07.014
fatcat:t3a3w5klvfhmfp36k4yuur5aea
Triple Space Computing: Adding Semantics to Space-Based Computing
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we propose Triple Space Computing as a new communication and coordination framework for Semantic Web and Semantic Web Services. ...
Corso offers maximum scalability and flexibility by allowing applications to communicate with one another via common distributed persistent "spaces of objects". ...
Acknowledgement The work was supported by the Austrian Federal Ministry for Transport, Innovation, and Technology under the FIT-IT Semantic Systems project Triple Space Computing (TSC 809249). ...
doi:10.1007/11836025_30
fatcat:ivsd2braqjaglkefn3ri5far64
The Spacetub Models and Framework
[chapter]
2002
Lecture Notes in Computer Science
# $ % is a framework to model a variety of coordination languages from the & ( ') 0 family and a testbed for experimentation with them. ...
In this work, we analyse a set of coordination languages wrt. several criteria and try to detect similarities and differences. ...
Design Our framework was inspired by 's rules for the definition of security policies. We define a coordination language with a set of rules. ...
doi:10.1007/3-540-46000-4_32
fatcat:h7ctrjrrfjfwvhkxd7vryttip4
Data Driven Language for Agents Secure Interaction
[chapter]
2010
Lecture Notes in Computer Science
This paper discusses the security issues in data driven coordination languages. These languages rely on a data space shared by the agents and used to coordinate their activities. ...
We extend these languages with a main distinguishing feature, which is the possibility to define fine-grained security conditions, associated with every datum in the shared space. ...
In data driven coordination languages, security is generally enforced by using multiple (logical) spaces or by stating "Interaction Laws". With multiple spaces (e.g. ...
doi:10.1007/978-3-642-13338-1_5
fatcat:kzznptjazjfa3eyk37yhkq56sy
New approach to defining the term Space Traffic Management based on linguistic analysis
2021
Transportation Research Procedia
This paper deals with a new approach to defining the term Space Traffic management. ...
Abstract This paper deals with a new approach to defining the term Space Traffic management. ...
is a process of control, monitoring and coordination of space traffic with a view to achieve safe operational environment without collisions and interference and with reliable collision avoidance system ...
doi:10.1016/j.trpro.2021.06.036
fatcat:faneq5oqjzdjxaojdsjv25ic6i
Cybercrime Regulation through Laws and Strategies: A Glimpse into the Indian Experience
2020
International Journal of Digital Law
This Act underwent amendment in 2008 to accommodate provisions essential to regulate cybercrimes as well as protect data and privacy on cyber space. ...
In addition to the law, other strategies were designed and adopted to better regulate cyber offences including announcing cyber security policies, constituting institutions to take care of certain concerns ...
.
4) To implement Cyber Crisis Management Plan for dealing with cyber related incidents impacting critical national processes or endangering public safety and security of the Nation, by way of well coordinated ...
doi:10.47975/ijdl/1nagarathna
fatcat:7krsbtgec5fx3ju3wexehmchsq
Towards Access Control for Isolated Applications
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
with each other in a regulated and secure manner. ...
With the advancements in contemporary multi-core CPU architectures, it is now possible for a server operating system (OS), such as Linux, to handle a large number of concurrent application services on ...
Coordination is performed exclusively through control tuples.
Security Aspects We focus on the confidentiality, integrity, and availability issues with respect to tuple space implementation. ...
doi:10.5220/0005970001710182
dblp:conf/secrypt/BelyaevR16
fatcat:x52coqttibfqtdekiujsmouiqa
Formal Specification and Enactment of Security Policies through Agent Coordination Contexts
2003
Electronical Notes in Theoretical Computer Science
Accordingly, we show that process algebras are a suitable tool for both specification and enactment of security and coordination policies through ACCs. ...
By focussing on multi-agent systems, we discuss the notion of Agent Coordination Context (ACC) as an abstraction that (i) works as an organization and security abstraction, (ii) integrates well with abstractions ...
Security represents a dual aspect with respect to coordination: as discussed in [11] , coordination is in some sense the constructive counterpart of security in the dynamics of interaction. ...
doi:10.1016/s1571-0661(04)80682-0
fatcat:3qns73o63vehvfdwjutfffw5ea
« Previous
Showing results 1 — 15 out of 378,873 results