TY - GEN
T1 - Monitoring contract enforcement within Virtual Organizations
AU - Squicciarini, Anna
AU - Paci, Federica
PY - 2009
Y1 - 2009
N2 - Virtual Organizations (VOs) represent a new collaboration paradigm in which the participating entities pool resources, services, and information to achieve a common goal. VOs are often created on demand and dynamically evolve over time. An organization identifies a business opportunity and creates a VO to meet it. In this paper we develop a system for monitoring the sharing of resources in VO. Sharing rules are defined by a particular, common type of contract in which virtual organization members agree to make available some amount of specified resource over a given time period. The main component of the system is a monitoring tool for policy enforcement, called Security Controller (SC). VO members' interactions are monitored in a decentralized manner in that each member has one associated SC which intercepts all the exchanged messages. We show that having SCs in VOs prevents from serious security breaches and guarantees VOs correct functioning without degrading the execution time of members' interactions. We base our discussion on application scenarios and illustrate the SC prototype, along with some performance evaluation.
AB - Virtual Organizations (VOs) represent a new collaboration paradigm in which the participating entities pool resources, services, and information to achieve a common goal. VOs are often created on demand and dynamically evolve over time. An organization identifies a business opportunity and creates a VO to meet it. In this paper we develop a system for monitoring the sharing of resources in VO. Sharing rules are defined by a particular, common type of contract in which virtual organization members agree to make available some amount of specified resource over a given time period. The main component of the system is a monitoring tool for policy enforcement, called Security Controller (SC). VO members' interactions are monitored in a decentralized manner in that each member has one associated SC which intercepts all the exchanged messages. We show that having SCs in VOs prevents from serious security breaches and guarantees VOs correct functioning without degrading the execution time of members' interactions. We base our discussion on application scenarios and illustrate the SC prototype, along with some performance evaluation.
UR - http://www.scopus.com/inward/record.url?scp=84885893131&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885893131&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-03354-4_42
DO - 10.1007/978-3-642-03354-4_42
M3 - Conference contribution
AN - SCOPUS:84885893131
SN - 3642033539
SN - 9783642033537
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 563
EP - 577
BT - Collaborative Computing
T2 - 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008
Y2 - 13 November 2008 through 16 November 2008
ER -