Concurrent constraint programming
POPL '90 Proceedings of the 17th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Programming with POSIX threads
Programming with POSIX threads
Coordinating processes with secure spaces
Science of Computer Programming - Special issue on coordination languages and architectures
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Soft concurrent constraint programming
ACM Transactions on Computational Logic (TOCL)
Coordination with multicapabilities
Science of Computer Programming
Supporting Secure Coordination in SecSpaces
Fundamenta Informaticae
Principles of Information Security
Principles of Information Security
Access control: principle and practice
IEEE Communications Magazine
A Nonmonotonic Soft Concurrent Constraint Language to Model the Negotiation Process
Fundamenta Informaticae
Securely accessing shared resources with concurrent constraint programming
SEFM'12 Proceedings of the 10th international conference on Software Engineering and Formal Methods
Hi-index | 0.00 |
We present a fine-grained security model to enforce the access control on the constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a nonmonotonic version of Soft CCP (SCCP), that is an extension of CCP which deals with soft constraints, which are constraints that have a preference level associated to them. In the considered nomonotonic version (NMSCCP), the language is equipped with actions that can also remove constraints from the store. The language can be used for coordinating the agents on a common store of information. Clearly, in such scenario, is important to enhance the operations that the agents may perform with security and privacy, in order to limit their behavior, e.g., to hide some information or to prevent an agent to consume too many resources.