Proceedings International Conference on Dependable Systems and Networks
DOI: 10.1109/dsn.2002.1028906
|View full text |Cite
|
Sign up to set email alerts
|

Distributed object middleware to support dependable information sharing between organisations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
2

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 11 publications
0
13
0
2
Order By: Relevance
“…K(B,A) is then used to generate the MAC of message (6). (1) to C. C then sends message (2) to SA in order to check the identity of B. SA will send back a confirmation in message (3), confirming that B is a session partner of S. After receiving the confirmation, B will handle the request from C and send the result back. All the messages transferred during this process are encrypted by the secret key generated with the Diffie-Hellman algorithm.…”
Section: Formal Definitionsmentioning
confidence: 99%
See 1 more Smart Citation
“…K(B,A) is then used to generate the MAC of message (6). (1) to C. C then sends message (2) to SA in order to check the identity of B. SA will send back a confirmation in message (3), confirming that B is a session partner of S. After receiving the confirmation, B will handle the request from C and send the result back. All the messages transferred during this process are encrypted by the secret key generated with the Diffie-Hellman algorithm.…”
Section: Formal Definitionsmentioning
confidence: 99%
“…ith the emergence of service-oriented technologies, dynamism and flexibility are becoming the core characteristics of modern inter-organizational business processes, such as business application integration, distributed auction services, and order processing [1,2]. Within a serviceoriented architecture (SOA), an organization may encapsulate and publish its applications as services, and select and interact at runtime with the services provided by other organizations.…”
Section: Introductionmentioning
confidence: 99%
“…These requirements imply the collection, and verification, of non-repudiable evidence of the actions of parties who share and update information. We have implemented distributed object middleware called B2BObjects [1] that both presents the abstraction of shared state and meets these requirements by regulating, and recording, access and update to shared state. It is assumed that each enterprise has a local set of policies for information sharing that is consistent with an overall information sharing agreement (business contract) between the enterprises.…”
Section: Introductionmentioning
confidence: 99%
“…If the e-contract is in a given condition q (for example, WatingForOffer), there is a finite and well defined set of events (event 1 , event 2 , …,event m ) that can affect the future behaviour of the contract. The occurrence of event i determines what objects (variables, files, database, etc.)…”
Section: Mapping Conditions Rights and Obligations Into A Fsmmentioning
confidence: 99%
“…For non-repudiable information sharing we suggest the use of a B2BObject middleware [2] developed at Newcastle University. It is distributed object-based middleware, implemented in Java that supports information sharing between parties that do not necessarily trust each other.…”
Section: Infrastructure Supportmentioning
confidence: 99%