tative domain, which represents a client during col-
laboration. This is made possible through the use of
root entities and representative agents. The root en-
tity is the controller of a representative domain and
is the only entity within a representative domain that
communicates directly with the client. Whereas, rep-
resentative agents represent the root entity during a
cross-domain collaboration, this makes it possible to
have decentralize collaborations, where only neces-
sary data needs to be given to a representative agent
by its root entity.
Furthermore, the CSF provides an infrastructure so
that collaboration across different domains are secu-
rity model independent, since each representative do-
main can base its security rules on different security
models. This was a key design feature of the CSF,
since this reflects more real world situations.
Due to space limitations, we do not provide a proof
of completeness, verification mechanism, protocols
or security polices reconciliation of the CSF. These
topics will be presented in our future work.
REFERENCES
Barker, P. (1995). An analysis of user input to an x.500
white pages directory service. IEEE/ACM Trans.
Netw., 3(2):112–125.
Bell, D. and Padula, L. L. (1975). Secure computer systems:
Unified exposition and multics interpretation. Techni-
cal Report ESD-TR-75-306, MITRE MTR-2997.
Bhatti, R., Ghafoor, A., Bertino, E., and Joshi, J. B. D.
(2005). X-gtrbac: an xml-based policy specification
framework and architecture for enterprise-wide access
control. ACM Trans. Inf. Syst. Secur., 8(2):187–227.
Bistarelli, S. (2004). Semirings for Soft Constraint Solving
and Programming, volume 2962 of Lecture Notes in
Computer Science. Springer.
Bistarelli, S., Montanari, U., and Rossi, F. (1997).
Semiring-based constraint satisfaction and optimiza-
tion. J. ACM, 44(2):201–236.
Bradshaw, J. M., Dutfield, S., Carpenter, B., Jeffers, R., and
Robinson, T. (1995). KAoS: A Generic Agent Ar-
chitecture for Aerospace Applications. In Finin, T.
and Mayfield, J., editors, Proceedings of the CIKM
’95 Workshop on Intelligent Information Agents, Bal-
timore, Maryland.
Brewer, D. F. C. and Nash, M. J. (1989). The chinese wall
security policy. In IEEE Symposium on Security and
Privacy, pages 206–214.
Dawson, S., Samarati, P., di Vimercati, S. D. C., Lincoln,
P., Wiederhold, G., Bilello, M., and Akella, J. (2000).
Secure access wrapper: Mediating security between
heterogeneous databases. In Proc. of the Darpa Infor-
mation Survivability Conference & Exposition, Hilton
Head, South Carolina.
Ege, R. K., Yang, L., Kharma, Q., and Ni, X. (2004). Three-
layered mediator architecture based on dht. In ISPAN,
pages 313–318.
Gong, L. and Qian, X. (1994). The complexity and com-
posability of secure interoperation. pages 190–200.
Gong, L. and Qian, X. (1996). Computational issues in se-
cure interoperation. Software Engineering, 22(1):43–
52.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in operating systems. Commun. ACM,
19(8):461–471.
Lange, D. B. and Oshima, M. (1999). Seven good rea-
sons for mobile agents. Communications of the ACM,
42(3):88–89.
Liu, D., Law, K., and Wiederhold, G. (2000). Chaos: An ac-
tive security mediation system. In Conference on Ad-
vanced Information Systems Engineering, pages 232–
246.
Park, J. and Ram, S. (2004). Information systems interop-
erability: What lies beneath? ACM Trans. Inf. Syst.,
22(4):595–632.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. IEEE
Computer, 29(2):38–47.
Shehab, M., Bertino, E., and Ghafoor, A. (2005). Se-
cure collaboration in mediator-free environments. In
CCS ’05: Proceedings of the 12th ACM conference on
Computer and communications security, pages 58–67,
New York, NY, USA. ACM Press.
Sheth, A. P. and Larson, J. A. (1990). Federated data-
base systems for managing distributed, heteroge-
neous, and autonomous databases. ACM Comput.
Surv., 22(3):183–236.
Steiner, J. G., Neuman, B. C., and Schiller, J. I. (1988).
Kerberos: An authentication service for open network
systems. In Proceedings of the USENIX Winter 1988
Technical Conference, pages 191–202, Berkeley, CA.
USENIX Association.
Thome, M., Helsinger, A., and Wright, T. (2004). Cougaar:
a scalable, distributed multi-agent architecture. In
SMC (2), pages 1910–1917.
Wallace, M. (1996). Practical applications of constraint pro-
gramming. Constraints, 1(1/2):139–168.
Wiederhold, G. (1992). Mediators in the architecture of fu-
ture information systems. IEEE Computer, 25(3):38–
49.
Wiederhold, G., Bilello, M., Sarathy, V., and Qian, X.
(1996). A security mediator for health care informa-
tion.
Wiederhold, G. and Genesereth, M. R. (1997). The con-
ceptual basis for mediation services. IEEE Expert,
12(5):38–47.
Yang, L., Ege, R. K., Ezenwoye, O., and Kharma, Q.
(2004). A role-based access control model for infor-
mation mediation. In IRI, pages 277–282.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
370