ABSTRACT
Shared tuple spaces serve as coordination medium for independent processes to exchange data and messages in a flexible way. If communication takes place over the Internet, security becomes an important issue. It must be forbidden that unauthorized processes get access to protected data. In this paper, we present an authorization model for a space-based middleware that uses its own coordination mechanisms for defining fine-grained access control policies. By integrating coordination and security mechanisms into one single concept, the model allows for flexible and secure distributed collaboration.
References
- S. Craß, e. Kühn, and G. Salzer. Algebraic foundation of a data model for an extensible space-based collaboration protocol. IDEAS '09, pages 301--306. ACM, 2009. Google Scholar
Digital Library
- M. Cremonini, A. Omicini, and F. Zambonelli. Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach. COORDINATION '00, pages 99--114. Springer-Verlag, 2000. Google Scholar
Digital Library
- e. Kühn, R. Mordinyi, L. Keszthelyi, and C. Schreiber. Introducing the concept of customizable structured spaces for agent coordination in the production automation domain. In AAMAS '09 (1), pages 625--632. IFAAMAS, 2009. Google Scholar
Digital Library
- D. Gelernter. Generative communication in Linda. ACM Trans. Program. Lang. Syst., 7(1): 80--112, 1985. Google Scholar
Digital Library
- R. Gorrieri, R. Lucchi, and G. Zavattaro. Supporting Secure Coordination in SecSpaces. Fundam. Inf., 73: 479--506, 2006. Google Scholar
Digital Library
- OASIS. eXtensible Access Control Markup Language TC v 2.0 (XACML), 2005.Google Scholar
- A. Omicini, A. Ricci, and M. Viroli. RBAC for Organisation and Security in an Agent Coordination Infrastructure. Electron. Notes Theor. Comput. Sci., 128: 65--85, 2005. Google Scholar
Digital Library
- N. I. Udzir, A. Wood, and J. Jacob. Coordination with multicapabilities. Sci. Comput. Program., 64: 205--222, 2007. Google Scholar
Digital Library
Index Terms
A coordination-based access control model for space-based computing





Comments