Coordinated access control with temporal and spatial constraints on mobile execution in coalition environments

被引:3
|
作者
Fu, Song [1 ]
Xu, Cheng-Zhong [1 ]
机构
[1] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
基金
美国国家航空航天局; 美国国家科学基金会;
关键词
coordinated access control; temporal constraint; spatial constraint; mobile execution; coalition environment; computational grid;
D O I
10.1016/j.future.2006.12.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dynamics is an inherent characteristic of computational grids. The volatile nodal availablity requires grid applications and services be adaptive to changes of the underlying grid topology. Mobile execution allows mobile users or tasks to relocate across different nodes in the grid. This poses new challenges to resource access control. Resource sharing in the grid coalition environment creates certain temporal and spatial requirements for accesses by mobile entities. However, there is a lack of formal treatment of the impact of mobility on the shared resource access control. In this paper, we formalize the mobile execution of grid entities by using the mobile code model. We introduce a shared resource access language, SRAL, to model the behaviors of mobile codes. SRAL is structured and composed so that the program of a mobile code can be constructed recursively from primitive accesses. We define the operational semantics of SRAL and prove that it is expressive enough for most resource access patterns. In particular, it is complete in the sense that it can specify any program of regular trace model. A constraint language, SRAC, is defined to specify spatial constraints for shared resource accesses. Checking if the behavior of a mobile code satisfies a given spatial constraint can be solved by a polynomial-time algorithm. We apply the Duration Calculus to express temporal constraints, and show the constraint satisfaction problem is decidable as well. We extend the role-based access control model to specify and enforce our spatio-temporal constraints. To prove the concept and technical feasibility of our coordinated access control model, we implemented it in a mobile agent system, which emulates mobile execution in grids by software agents. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:804 / 815
页数:12
相关论文
共 50 条
  • [21] COSMOS: A context-centric access control middleware for mobile environments
    Bellavista, P
    Montanari, R
    Tibaldi, D
    MOBILE AGENTS FOR TELECOMMUNICATION APPLICATIONS, PROCEEDINGS, 2003, 2881 : 77 - 88
  • [22] Spatial-Temporal Coordinated Volt/VAR Control for Active Distribution Systems
    Su, Xiangjing
    Fang, Liying
    Yang, Jiajia
    Shahnia, Farhad
    Fu, Yang
    Dong, Zhao Yang
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (06) : 7077 - 7088
  • [23] Receding Horizon Robot Control in Partially Unknown Environments with Temporal Logic Constraints
    Nenchev, Vladislav
    Belta, Calin
    2016 EUROPEAN CONTROL CONFERENCE (ECC), 2016, : 2614 - 2619
  • [24] VibrAid: Comparing Temporal and Spatial Tactile Cues in Control Room Environments
    Pescara, Erik
    Diener, Vincent
    Beigl, Michael
    12TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS (PETRA 2019), 2019, : 138 - 145
  • [25] XACML-based policy-driven access control for mobile environments
    Qing, Xuebing
    Adams, Carlisle
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 523 - +
  • [26] User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
    Yang, Ho-Kyung
    Moon, Jeong-Kyung
    Choi, Cheol-Rim
    Ryou, Hwang-Bin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [27] A generalized temporal and spatial role-based access control model
    Chen H.-C.
    Wang S.-J.
    Wen J.-H.
    Huang Y.-F.
    Chen C.-W.
    Journal of Networks, 2010, 5 (08) : 912 - 920
  • [28] Towards an access control system for mobile Peer-to-Peer collaborative environments
    Fenkam, P
    Dustdar, S
    Kirda, E
    Reif, G
    Gall, H
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 95 - 100
  • [29] A new solution for assigning cryptographic keys to control access in mobile agent environments
    Chang, CC
    Lin, IC
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (01): : 137 - 146
  • [30] Secure Boolean Spatial Keyword Query With Lightweight Access Control in Cloud Environments
    Cui, Ningning
    Yang, Xiaochun
    Chen, Yunliang
    Li, Jianxin
    Wang, Bin
    Min, Geyong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9503 - 9514