Incorporation of security mechanisms into the tmo scheme for real time distributed computing

K. H. Kim, Juan A. Colmenares, Moon Cheol Kim, Zhen Zhang, Qian Zhou, Doo Hyun Kim, Sik-Sang Yau

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Many real-time distributed computing (RTDC) applications have stringent action timing requirements as well as tight security-enforcement requirements. Integration of security enforcement mechanisms into advanced component-based RTDC schemes has been recognized as an important research topic in recent years. In this paper we propose the first formal extension of the Time-triggered Message-triggered Object (TMO) component model devised to facilitate efficient construction of secure RTDC applications. The newly extended TMO structure is called the Adaptive Secure TMO (AS-TMO). A distinguishing characteristic of the proposed scheme is that security attributes (e.g., roles) are associated with AS-TMO parts (e.g., methods and data-container variable groups) instead of with entire AS-TMOs. We also present the execution engine facilities being incorporated into the middleware model, the TMO Support Middleware (TMOSM), for providing the security-enforcement capabilities defined in the AS-TMO scheme.

Original languageEnglish (US)
Title of host publicationProceedings - 1st International Workshop on Software Technologies for Future Dependable Distributed Systems, STFSSD 2009
Pages64-72
Number of pages9
DOIs
StatePublished - Dec 1 2009
Event1st International Workshop on Software Technologies for Future Dependable Distributed Systems, STFSSD 2009 - Tokyo, Japan
Duration: Mar 17 2009Mar 18 2009

Publication series

NameProceedings - 1st International Workshop on Software Technologies for Future Dependable Distributed Systems, STFSSD 2009

Other

Other1st International Workshop on Software Technologies for Future Dependable Distributed Systems, STFSSD 2009
CountryJapan
CityTokyo
Period3/17/093/18/09

Keywords

  • AS-TMO
  • AS-TMOSM
  • AS-TNCM
  • Access control
  • Encryption
  • Real-time
  • Role
  • Role-extension
  • Secure communication
  • Security
  • TMO

ASJC Scopus subject areas

  • Hardware and Architecture
  • Information Systems

Fingerprint Dive into the research topics of 'Incorporation of security mechanisms into the tmo scheme for real time distributed computing'. Together they form a unique fingerprint.

  • Cite this

    Kim, K. H., Colmenares, J. A., Kim, M. C., Zhang, Z., Zhou, Q., Kim, D. H., & Yau, S-S. (2009). Incorporation of security mechanisms into the tmo scheme for real time distributed computing. In Proceedings - 1st International Workshop on Software Technologies for Future Dependable Distributed Systems, STFSSD 2009 (pp. 64-72). [4804574] (Proceedings - 1st International Workshop on Software Technologies for Future Dependable Distributed Systems, STFSSD 2009). https://doi.org/10.1109/STFSSD.2009.51