Specification of Secure Distributed Collaboration Systems
نویسندگان
چکیده
" $#&%' (% #) * + , ( (%. / , 0#213 45 0 61/ ,% 7 * * 8#2% 3 9 *: ; % 7*7* :,% % =<>% ?'@ % OQ 0 ! $ %. ' % 7g h O. ' : 3 *% LV % 0K *% i ,%.7 -1_ %Q 7 [ A Oj ^#2 % R 4. ;7 Oj 7' % 7 7E :,% *% 5 , K % 5 ; > 9 : k l N13<>% 3 mon$ 9 : 3 $ % 7*7* :,% % ! jp8%.7 D: = ) % L % 7 rq3 0 s1H ,% 7* -1/ , 0K %. k
منابع مشابه
Design of a Policy-Driven Middleware for Secure Distributed Collaboration
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activities, and uses role-based security policies and event count based coordination specification. From the specifications of a collaboration environment, appropriate policy modules ar...
متن کاملSecure Management of Distributed Collaboration Systems
Our goal is to construct secure distributed collaboration systems by coupling their high-level specifications with a policy-driven middleware. This paper addresses three problems related to decentralized management of collaboration systems by a middleware. To correctly enforce security and coordination policies, the middleware determines which nodes can be trusted for enforcing policies related...
متن کاملSpecification and Implementation of Secure Distributed Collaboration Systems
" $#&%' (% #) * ) + , *% /./ 0 / 12 0 3 4 5 %6.87 ./ -)% % 9 ;:(% <'= % :> 4?0 4 @#A %6 B 8 ( /1 C. DE . ) 87 F % HGI * / + J 8#K?L + * /M' @ M' + ' N% #0 %6. O+ 8 P?C / Q J? R %6. ./ -)% %6 9 JDJ % ' ' ) +
متن کاملDynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture
Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کامل