Collaborative Computing: Networking, Applications and Worksharing. 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers

Research Article

Secure and Conditional Resource Coordination for Successful Collaborations

Download
481 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-03354-4_22,
        author={Dongxi Liu and Surya Nepal and David Moreland and Shiping Chen and Chen Wang and John Zic},
        title={Secure and Conditional Resource Coordination for Successful Collaborations},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers},
        proceedings_a={COLLABORATECOM},
        year={2012},
        month={5},
        keywords={Secure Resource Model Robust Collaboration Resource Coordination Access Policies},
        doi={10.1007/978-3-642-03354-4_22}
    }
    
  • Dongxi Liu
    Surya Nepal
    David Moreland
    Shiping Chen
    Chen Wang
    John Zic
    Year: 2012
    Secure and Conditional Resource Coordination for Successful Collaborations
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-642-03354-4_22
Dongxi Liu1,*, Surya Nepal1,*, David Moreland1,*, Shiping Chen1,*, Chen Wang1,*, John Zic1,*
  • 1: CSIRO ICT Center
*Contact email: Dongxi.Liu@csiro.au, Surya.Nepal@csiro.au, David.Moreland@csiro.au, Shiping.Chen@csiro.au, Chen.Wang@csiro.au, John.Zic@csiro.au

Abstract

Successful completion of collaborations is necessary for collaborating participants to achieve their prescribed collaboration purposes. In this paper, we address the problem of successful completion of collaborations under a new model, called collaborative resource model. This model is graph-based, allowing participants to describe different ways to contribute and require resources for collaborations and the dependency relations among these resources. Resources in this model are protected by access control policies declared not only by resource providers but also by resource requestors. The requestors policies state how they will redistribute the acquired resources and thus increase the confidence of the providers to share resources. Except access control policies, resources are also constrained by usage conditions to reflect the fact, for instance, that a resource might be available only at some time. Based on this model, we present a coordination mechanism. Successful coordination means that all participants can get the necessary resources to complete their collaborations.