Incorporation of Security Mechanisms into the TMO Scheme for Real Time Distributed Computing

Many real-time distributed computing (RTDC) applications have stringent action timing requirements as well as tight security-enforcement requirements. Integration of security enforcement mechanisms into advanced component-based RTDC schemes has been recognized as an important research topic in recent years. In this paper we propose the first formal extension of the Time-triggered Message-triggered Object (TMO) component model devised to facilitate efficient construction of secure RTDC applications. The newly extended TMO structure is called the Adaptive Secure TMO (AS-TMO). A distinguishing characteristic of the proposed scheme is that security attributes (e.g., roles) are associated with AS-TMO parts (e.g., methods and data-container variable groups) instead of with entire AS-TMOs. We also present the execution engine facilities being incorporated into the middleware model, the TMO Support Middleware (TMOSM), for providing the security-enforcement capabilities defined in the AS-TMO scheme.

[1]  Sheng Liu,et al.  TMO Structuring of a Networked System for Seamless Streaming and Tiled Display of High-Definition Movies , 2007, SEUS.

[2]  K. H. Kim Systematic composition and analyzability of dependable networked embedded computing systems , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[3]  R. Sandhu,et al.  The UCON ABC Usage Control Model JAEHONG , 2004 .

[4]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[5]  Lazaros F. Merakos,et al.  A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.

[6]  K. H. Kim,et al.  An efficient middleware architecture supporting time-triggered message-triggered objects and an NT-based implementation , 1999, Proceedings 2nd IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'99) (Cat. No.99-61702).

[7]  Bhavani M. Thuraisingham,et al.  Dependable and secure TMO scheme , 2006, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06).

[8]  Bhavani M. Thuraisingham,et al.  Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON , 2007, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07).

[9]  K. H. Kim,et al.  Realization of an Adaptive Distributed Sound System Based on Global-Time-Based Coordination and Listener Localization , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[10]  Sheng Liu,et al.  A global-time-based approach for high-quality real-time video streaming services , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[11]  Hee Yong Youn,et al.  A middleware model supporting time-triggered message-triggered objects for standard Linux systems , 2007, Real-Time Systems.

[12]  K. H. Kim,et al.  APIs for Real-Time Distributed Object Programming , 2000, Computer.

[13]  Hermann Kopetz,et al.  Real-time systems , 2018, CSC '73.

[14]  K. H. Kim Object Structures for Real-Time Systems and Simulators , 1997, Computer.

[15]  Angelos D. Keromytis,et al.  A Study of the Relative Costs of Network Security Protocols , 2002, USENIX Annual Technical Conference, FREENIX Track.

[16]  K. H. Kim,et al.  Object-oriented real-time distributed programming and support middleware , 2000, Proceedings Seventh International Conference on Parallel and Distributed Systems (Cat. No.PR00568).