Skip to main content

Securely Accessing Shared Resources with Concurrent Constraint Programming

  • Conference paper
Book cover Software Engineering and Formal Methods (SEFM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7504))

Included in the following conference series:

Abstract

We present a fine-grained security model to enforce the access control on the shared constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a nonmonotonic version of Soft CCP (SCCP), that is an extension of CCP where the constraints have a preference level associated with them. Crisp constraints can be modeled in the same framework as well. In the considered nonmonotonic soft version (NmSCCP), it is also possible to remove constraints from the store. The language can be used for coordinating agents on a common store of information that represents the set of shared resources. In such scenarios, it is clearly important to enforce the integrity and confidentiality rights on the resources, in order, for instance, to hide part of the information to some agents, or to prevent an agent to consume too many resources.

Work carried out during the tenure of an ERCIM ”Alain Bensoussan” Fellowship Programme. This Programme is supported by the Marie Curie Co-funding of Regional, National and International Programmes (COFUND) of the European Commission.

Research partially supported by MIUR PRIN 20089M932N project: “Innovative and multi-disciplinary approaches for constraint and preference reasoning”, by CCOS FLOSS project “Software open source per la gestione dell’epigrafia dei corpus di lingue antiche”, and by INDAM GNCS project “Fairness, Equità e Linguaggi”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bettini, L., Nicola, R.D.: A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces. In: Guelfi, N., Astesiano, E., Reggio, G. (eds.) FIDJI 2002. LNCS, vol. 2604, pp. 175–184. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Bistarelli, S., Campli, P., Santini, F.: A secure coordination of agents with nonmonotonic soft concurrent constraint programming. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 2012, pp. 1551–1553. ACM, New York (2012)

    Chapter  Google Scholar 

  3. Bistarelli, S., Gadducci, F.: Enhancing constraints manipulation in semiring-based formalisms. In: ECAI 2006, 17th European Conference on Artificial Intelligenc. Frontiers in Artificial Intelligence and Applications, vol. 141, pp. 63–67. IOS Press (2006)

    Google Scholar 

  4. Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. Journal of the ACM 44(2), 201–236 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  5. Bistarelli, S., Montanari, U., Rossi, F.: Soft concurrent constraint programming. ACM Trans. Comput. Logic 7(3), 563–589 (2006)

    Article  MathSciNet  Google Scholar 

  6. Bistarelli, S., Santini, F.: A nonmonotonic soft concurrent constraint language to model the negotiation process. Fundam. Inform. 111(3), 257–279 (2011)

    MathSciNet  MATH  Google Scholar 

  7. Butenhof, D.R.: Programming with POSIX threads. Addison-Wesley Longman Publishing Co., Inc., Boston (1997)

    Google Scholar 

  8. Frühwirth, T.W.: Constraint Handling Rules. In: Podelski, A. (ed.) Constraint Programming: Basics and Trends. LNCS, vol. 910, pp. 90–107. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  9. Gorla, D., Pugliese, R.: Resource Access and Mobility Control with Dynamic Privileges Acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 119–132. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Gorrieri, R., Lucchi, R., Zavattaro, G.: Supporting secure coordination in SecSpaces. Fundam. Inform. 73(4), 479–506 (2006)

    MathSciNet  MATH  Google Scholar 

  11. Handorean, R., Roman, G.C.: Secure sharing of tuple spaces in ad hoc settings. Electr. Notes Theor. Comput. Sci. 85(3) (2003)

    Google Scholar 

  12. López, H.A., Palamidessi, C., Pérez, J.A., Rueda, C., Valencia, F.D.: A Declarative Framework for Security: Secure Concurrent Constraint Programming. In: Etalle, S., Truszczyński, M. (eds.) ICLP 2006. LNCS, vol. 4079, pp. 449–450. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. McCollum, C.D., Messing, J.R., Notargiacomo, L.: Beyond the pale of MAC and DAC-defining new forms of access control. In: IEEE Symposium on Security and Privacy, pp. 190–200 (1990)

    Google Scholar 

  14. Nicola, R.D., Gorla, D., Pugliese, R.: On the expressive power of KLAIM-based calculi. Theor. Comput. Sci. 356(3), 387–421 (2006)

    Article  MATH  Google Scholar 

  15. Omicini, A., Ricci, A., Viroli, M.: Agent coordination contexts for the formal specification and enactment of coordination and security policies. Sci. Comput. Program. 63(1), 88–107 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  16. Saraswat, V., Rinard, M.: Concurrent constraint programming. In: POPL 1990, pp. 232–245. ACM (1990)

    Google Scholar 

  17. Schneider, F.B.: Least privilege and more. IEEE Security & Privacy 1(5), 55–59 (2003)

    Article  Google Scholar 

  18. Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37, 29–41 (2005)

    Article  Google Scholar 

  19. Udzir, N.I., Wood, A.M., Jacob, J.L.: Coordination with multicapabilities. Sci. Comput. Program. 64(2), 205–222 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  20. Vitek, J., Bryce, C., Oriol, M.: Coordinating processes with secure spaces. Sci. Comput. Program. 46(1-2), 163–193 (2003)

    Article  MATH  Google Scholar 

  21. Whitman, M.E., Mattord, H.J.: Principles of Information Security, 3rd edn. Course Technology Press, Boston (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bistarelli, S., Santini, F. (2012). Securely Accessing Shared Resources with Concurrent Constraint Programming. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds) Software Engineering and Formal Methods. SEFM 2012. Lecture Notes in Computer Science, vol 7504. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33826-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33826-7_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33825-0

  • Online ISBN: 978-3-642-33826-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics