Advertisement

Security Issues in the Tuple-Space Coordination Model

  • Mario Bravetti
  • Nadia Busi
  • Roberto Gorrieri
  • Roberto Lucchi
  • Gianluigi Zavattaro
Conference paper
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 173)

Abstract

We present some security issues that emerge when the tuple-space coordination model is used in open systems. Then we describe SecSpaces, a tuple-space based language, which supports secure coordination in untrusted environments. Finally, we will discuss some real examples of applications interacting via tuple spaces by showing how to support some of the main security features with SecSpaces.

Keywords

Security Issue Control Field User Session Tuple Space Access Permission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [Bravetti et al., 2003]
    Bravetti, M., Gorrieri, R., and Lucchi, R. (2003). A formal approach for checking security properties in SecSpaces. In 1st International Workshop on on Security Issues in Coordination Models, Languages and Systems, volume 85.3 of ENTCS.Google Scholar
  2. [Busi et al., 2002]
    Busi, N., Gorrieri, R., Lucchi, R., and Zavattaro, G. (2002). Secspaces: a data-driven coordination model for environments open to untrusted entities. In 1st International Workshop on Foundations of Coordination Languages and Software Architectures, volume 68.3 of ENTCS.Google Scholar
  3. [Busi et al., 2003]
    Busi, N., Manfredini, C., Montresor, A., and Zavattaro, G. (2003). PeerSpaces: Data-driven Coordination in Peer-to-Peer Networks. In Proc. of ACM Symposium on Applied Computing (SAC'03), pages 380–386. ACM Press.Google Scholar
  4. [Computing Associates, 1995]
    Computing Associates, S. (1995). Linda: User's guide and reference manual. Scientific Computing Associates.Google Scholar
  5. [De Nicola et al., 1998]
    De Nicola, R., Ferrari, G., and Pugliese, R. (1998). KLAIM: A Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering, 24(5):315–330. Special Issue: Mobility and Network Aware Computing.CrossRefGoogle Scholar
  6. [Gigaspaces]
    Gigaspaces. Use cases. http://www.gigaspaces.com/usecases.htm/.Google Scholar
  7. [Handorean and Roman, 2003]
    Radu Handorean and Gruia-Catalin Roman (2003). Secure Sharing of Tuple Spaces in Ad Hoc Settings. In 1st International Workshop on on Security Issues in Coordination Models, Languages and Systems, volume 85.3 of ENTCS.Google Scholar
  8. [Lucchi and Zavattaro, 2004]
    Lucchi, R. and Zavattaro, G. (2004). WSSecSpaces: a Secure Data-Driven Coordination Service for Web Services Applications. In Proc. of ACM Symposium on Applied Computing (SAC'04), pages 487–491. ACM Press.Google Scholar
  9. [Murphy et al., 2001]
    Murphy, A., Picco, G., and Roman, G.-C. (2001). A middleware for physical and logical mobility. In 21st International Conference on Distributed Computing Systems, pages 524–533.Google Scholar
  10. [Schneier, 1996]
    Schneier, B. (1996). Applied Cryptography. Wiley.Google Scholar
  11. [Vitek et al., 2003]
    Vitek, J., Bryce, C., and Oriol, M. (2003). Coordinating Processes with Secure Spaces. Science of Computer Programming, 46:163–193.CrossRefGoogle Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Mario Bravetti
    • 1
  • Nadia Busi
    • 1
  • Roberto Gorrieri
    • 1
  • Roberto Lucchi
    • 1
  • Gianluigi Zavattaro
    • 1
  1. 1.Dipartimento di Scienze dell'InformazioneUniversità degli Studi di BolognaBolognaItaly

Personalised recommendations