What is coordination theory and how can it help design cooperative work systems?
CSCW '90 Proceedings of the 1990 ACM conference on Computer-supported cooperative work
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Petri Net Theory and the Modeling of Systems
Petri Net Theory and the Modeling of Systems
The TOOLBUS Coordination Architecture - A Demonstration
AMAST '96 Proceedings of the 5th International Conference on Algebraic Methodology and Software Technology
A Java Coordination Tool for Web-Service Architectures: The Location-Based Service Context
FIDJI '01 Revised Papers from the International Workshop on Scientific Engineering for Distributed Java Applications
Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications
COORDINATION '99 Proceedings of the Third International Conference on Coordination Languages and Models
Coordination Technology for Workflows on the Web: Workspaces
COORDINATION '00 Proceedings of the 4th International Conference on Coordination Languages and Models
Characterizing Coordination Architectures According to Their Non-Functional Execution Properties
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 7 - Volume 7
Coordination models and languages
Coordination models and languages
A Security Characterisation Framework for Trustworthy Component Based Software Systems
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
Hi-index | 0.00 |
This paper presents an approach for building secure service-based coordinated systems. Secure coordination is considered at two levels: abstraction (i.e., specification) and execution (i.e., run level). At the abstraction level, we define a general model enabling to specify coordination and its related non functional properties (such as security). The idea is to use constraints for expressing the application logic of a coordinated system and its required security strategies. Coordination activities are the key concepts used for controlling the execution of participating services. Constraints are specified as pre and post conditions of these coordination activities. At the execution level, we propose an architecture which implements strategies to verify constraints and manage the secure execution of coordination. We propose also an instantiating vade-mecum to configure execution level components according to a specific set of constraints.