DocumentCode :
3139287
Title :
A paradigm for security enforcement in CapBasED-AMS
Author :
Hung, Patrick C K ; Karlapalem, Kamalakar
Author_Institution :
Dept. of Comput. Sci., Univ. of Sci. & Technol., Hong Kong
fYear :
1997
fDate :
24-27 Jun 1997
Firstpage :
79
Lastpage :
88
Abstract :
The CapBasED-AMS (CAPability-BASed and Event-Driven Activity Management System) deals with the management and execution of activities. A problem-solving agent (PSA) is a human, a hardware system or a software system having the ability to execute activities. An activity consists of multiple interdependent tasks that need to be coordinated, scheduled and executed by a set of PSAs. Since security is an essential and integral part of activities, the activity management system has to manage and execute the activities in a secure way. In the CapBasED-AMS, threats such as unauthorized access or modification are identified as events. The security pilferage or illegal violation of privacy through the accessing of specification-time, compile-time or run-time data from the activity management system and the PSAs is monitored, controlled and reported. We present a secure CapBasED-AMS by taking into consideration: the system infrastructure; secure match-making with additional security constraints; security policies and a secure PSA; the task coordination model for security resource control from the PSA viewpoint, the organization viewpoint, the task viewpoint and the activity viewpoint by adapting a role-based resource security model; and secure execution of tasks with the PSA role-based security model
Keywords :
problem solving; security of data; software agents; CapBasED-AMS; activity execution; capability-based event-driven activity management system; compile-time data; illegal privacy violation; multiple interdependent tasks; pilferage; problem-solving agent; role-based resource security model; run-time data; secure match-making; security constraints; security enforcement paradigm; security policies; security resource control; security threats; specification-time data; system infrastructure; task coordination model; task execution; task scheduling; unauthorized access; unauthorized modification; Control systems; Data privacy; Data security; Hardware; Humans; Monitoring; Problem-solving; Runtime; Scheduling; Software systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cooperative Information Systems, 1997. COOPIS '97., Proceedings of the Second IFCIS International Conference on
Conference_Location :
Kiawah Island, SC
Print_ISBN :
0-8186-7946-8
Type :
conf
DOI :
10.1109/COOPIS.1997.613805
Filename :
613805
Link To Document :
بازگشت