Specification of Secure Distributed Collaboration Systems

نویسندگان

  • Anand R. Tripathi
  • Tanvir Ahmed
  • Richa Kumar
چکیده

" $#&%' (% #) * + , ( (%. / , 0#213 45 0 61/ ,% 7 * * 8#2% 3 9 *: ; % 7*7* :,% % =<>% ?'@ % OQ 0 ! $ %. ' % 7g h O. ' : 3 *% LV % 0K *% i ,%.7 -1_ %Q 7 [ A Oj ^#2 % R 4. ;7 Oj 7' % 7 7E :,% *% 5 , K % 5 ; > 9 : k l N13<>% 3 mon$ 9 : 3 $ % 7*7* :,% % ! jp8%.7 D: = ) % L % 7 rq3 0 s1H ,% 7* -1/ , 0K %. k

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of a Policy-Driven Middleware for Secure Distributed Collaboration

We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activities, and uses role-based security policies and event count based coordination specification. From the specifications of a collaboration environment, appropriate policy modules ar...

متن کامل

Secure Management of Distributed Collaboration Systems

Our goal is to construct secure distributed collaboration systems by coupling their high-level specifications with a policy-driven middleware. This paper addresses three problems related to decentralized management of collaboration systems by a middleware. To correctly enforce security and coordination policies, the middleware determines which nodes can be trusted for enforcing policies related...

متن کامل

Specification and Implementation of Secure Distributed Collaboration Systems

" $#&%' (% #) * ) + , *% /./ 0 / 12 0 3 4 5 %6.87 ./ -)% % 9 ;:(% <'= % :> 4?0 4 @#A %6 B 8 ( /1 C. DE . ) 87 F % HGI * / + J 8#K?L + * /M' @ M' + ' N% #0 %6. O+ 8 P?C / Q J? R %6. ./ -)% %6 9 JDJ % ' ' ) +

متن کامل

Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture

Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003