A Formal Model of Client-Cloud Interaction

  • Károly BósaEmail author
  • Roxana-Maria Holom
  • Mircea Boris Vleju
Part of the Texts & Monographs in Symbolic Computation book series (TEXTSMONOGR)


In our former work, we have showed that cloud computing still requires lots of fundamental research. Among many other existing problems in cloud computing, we identified the lack of client orientation and lack of formal foundations as serious deficiencies. In this chapter, we give a summary on our research and discuss the architectures as well as the formal models of some software solutions with which we are going to address (a part of) these two problems in cloud computing.The solution we propose is a novel and uniform client-cloud interaction approach by which cloud service owners, who may be different from the cloud providers, are able to fully control the usage of their services in the case of each user subscription. In this context, any cloud service can be invoked by distinct devices; therefore, the content must be adapted to various channels and end devices, in particular with respect to needs arising from mobile clients. For a quick and seamless integration between the cloud provider’s identity management system and the system used by the client, we introduce the concept of a client-centric tool. An extension of the client-cloud interaction model enables client-to-client interaction (CTCI) in an almost direct way, so that the involvement of cloud services is transparent to the users.In this chapter, we propose a formalization of this solution that incorporates the major advantages of abstract state machines (ASMs) and ambient calculus by specifying the algorithms of executable components (agents) in terms of ASMs and by describing their communication topology, locality, and mobility in the terms of ambient calculus.


Cloud Computing Unify Modeling Language Cloud Service Cloud Provider Service Operation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This research has been supported by the Christian Doppler Society.


  1. 1.
    Afilias Technologies Ltd: Mobile device detection solution—deviceatlas. (2013)
  2. 2.
    Ahn, G.J., Ko, M., Shehab, M.: Privacy-enhanced user-centric identity management. In: IEEE International Conference on Communications, 2009. ICC ’09, pp. 1–5 (2009). doi: 10.1109/ICC.2009.5199363
  3. 3.
    Alalfi, M.H., Cordy, J.R., Dean, T.R.: Modeling methods for web application verification and testing: state of the art. Softw. Test. Verif. Reliab. 19(4), 265–296 (2009). doi: 10.1002/stvr.v19:4.
  4. 4.
    Ali, N., Babar, M.: Modeling service oriented architectures of mobile applications by extending soaml with ambients. In: 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009. SEAA ’09, pp. 442–449 (2009). doi: 10.1109/SEAA.2009.25
  5. 5.
    Ali, N., Ramos, I., Solis, C.: Ambient-prisma: ambients in mobile aspect-oriented software architecture. J. Syst. Softw. 83(6), 937–958 (2010). doi: [Software Architecture and Mobility]
  6. 6.
    Ali, N., Chen, F., Solis, C.: Modeling support for mobile ambients in service oriented architecture. In: IEEE First International Conference on Mobile Services (MS), 2012, pp. 1–8 (2012). doi: 10.1109/MobServ.2012.18 Google Scholar
  7. 7.
    Alpár, G., Hoepman, J.H., Siljee, J.: The identity crisis, security, privacy and usability issues in identity management. CoRR abs/1101.0427 (2011)Google Scholar
  8. 8.
    Alrodhan, W., Mitchell, C.: Addressing privacy issues in cardspace. In: Third International Symposium on Information Assurance and Security, 2007. IAS 2007, pp. 285–291 (2007). doi: 10.1109/IAS.2007.12 Google Scholar
  9. 9.
    Altenhofen, M., Börger, E., Lemcke, J.: An abstract model for process mediation. In: Proceedings of the 7th International Conference on Formal Methods and Software Engineering, ICFEM’05, pp. 81–95. Springer, Berlin/Heidelberg (2005). doi: 10.1007/11576280_7.
  10. 10.
    Amazon Web Services: Amazon elastic compute cloud (amazon ec2). (2014)
  11. 11.
    Apache Software Foundation: Apache directory. (2013)
  12. 12.
    Apache Software Foundation: Apache tomcat. (2013)
  13. 13.
    Arcaini, P., Gargantini, A., Riccobene, E.: AsmetaSMV: a way to link high-level ASM models to low-level NuSMV specifications. In: Proceedings of the 2nd International Conference on Abstract State Machines, Alloy, B and Z (ABZ 2010). Lecture Notes in Computer Science, vol. 5977, pp. 61–74. Springer, Heidelberg (2010)Google Scholar
  14. 14.
    Ateṣ, F., Irish, P., Sexton, A., Seddon, R., Farkas, A.: Modernizr: the feature detection library for html5/css3. (2013)
  15. 15.
    Azure, M.: Azure: Microsoft’s cloud platform. (2014)
  16. 16.
    Barnett, M., Schulte, W., Tillmann, N.: Using asml for runtime verification. In: Börger, E., Gargantini, A., Riccobene, E. (eds.) Abstract State Machines 2003. Lecture Notes in Computer Science, vol. 2589, pp. 407–407. Springer, Berlin/Heidelberg (2003). doi: 10.1007/3-540-36498-6_24.
  17. 17.
    Beste, F.: The model prover: a sequent-calculus based modal π-calculus model checker tool for finite control π-calculus agents. Master’s thesis, Department of Computer Science, Uppsala University (1998).
  18. 18.
    Binemann-Zdanowicz, A., Thalheim, B.: Modeling information services on the basis of ASM semantics. In: Proceedings of the Abstract State Machines 10th International Conference on Advances in Theory and Practice, ASM’03, pp. 408–410. Springer, Berlin/Heidelberg (2003).
  19. 19.
    Blass, A., Gurevich, Y.: Abstract state machines capture parallel algorithms. ACM Trans. Comput. Logic 4, 578–651 (2003). doi:
  20. 20.
    Blass, A., Gurevich, Y.: Abstract state machines capture parallel algorithms: correction and extension. ACM Trans. Comput. Logic 9, 19:1–19:32 (2008). doi: Scholar
  21. 21.
    Bolis, F., Gargantini, A., Guarnieri, M., Magri, E., Musto, L.: Model-driven testing for web applications using abstract state machines. In: Grossniklaus, M., Wimmer, M. (eds.) Current Trends in Web Engineering. Lecture Notes in Computer Science, vol. 7703, pp. 71–78. Springer, Berlin/Heidelberg (2012). doi: 10.1007/978-3-642-35623-0_7.
  22. 22.
    Börger, E.: The asm refinement method. Form. Asp. Comput. 15(2–3), 237–257 (2003). doi: 10.1007/s00165-003-0012-7.
  23. 23.
    Börger, E.: Construction and analysis of ground models and their refinements as a foundation for validating computer based systems. Form. Asp. Comput. 19(2), 225–241 (2007). doi: 10.1007/s00165-006-0019-y.
  24. 24.
    Börger, E., Rosenzweig, D.: The wam—definition and compiler correctness. In: Beierle, C., Plümer, L. (eds.) Logic Programming: Formal Methods and Practical Applications. Studies in Computer Science and Artificial Intelligence, vol. 11, pp. 20–90. North-Holland, Amsterdam (1995)Google Scholar
  25. 25.
    Börger, E., Stärk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer, New York (2003)CrossRefGoogle Scholar
  26. 26.
    Börger, E., Cisternino, A., Gervasi, V.: Ambient abstract state machines with applications. J. Comput. Syst. Sci. (Special Issue in honor of Amir Pnueli) 78(3), 939–959 (2012). doi: 10.1016/j.jcss.2011.08.004.
  27. 27.
    Börger, E., Cisternino, A., Gervasi, V.: Contribution to a rigorous analysis of web application frameworks. In: Derrick, J., Gnesi, S., Latella, D., Treharne, H. (eds.) Integrated Formal Methods. Lecture Notes in Computer Science, vol. 7321, pp. 1–20. Springer, Berlin/ Heidelberg (2012). doi: 10.1007/978-3-642-30729-4_1.
  28. 28.
    Bósa, K.: A formal model of a cloud service architecture in terms of ambient asm. Technical report, Christian Doppler Laboratory for Client-Centric Cloud Computing (CDCC), Johannes Kepler University Linz, Hagenberg (2012)Google Scholar
  29. 29.
    Bósa, K.: An ambient asm model for client-to-client interaction via cloud computing. In: Proceedings of the 8th International Conference on Software and Data Technologies (ICSOFT), Reykjavik, Iceland, pp. 459–470. SciTePress (2013). doi: 10.5220/0004490904590470. (Best Paper Award)
  30. 30.
    Bósa, K.: An Ambient ASM Model for Cloud Architectures. Acta Cybernetica (2014). SubmittedGoogle Scholar
  31. 31.
    Bósa, K.: Formal modeling of mobile computing systems based on ambient abstract state machines. Semant. Data Knowl. Bases 7693, 18–49 (2013). doi: 10.1007/978-3-642-36008-4_2.
  32. 32.
    Boudol, G., Castellani, I., Hennessy, M., Kiehn, A.: A theory of processes with localities. Form. Asp. Comput. 6, 165–200 (1994). doi:10.1007/BF01221098.
  33. 33.
    Brandtzaeg, E., Parastoo, M., Mosser, S.: Towards a domain-specific language to deploy applications in the clouds. In: Cloud Computing 2012: 3rd International Conference on Cloud Computing, Grids, and Virtualization, pp. 213–218. IARIA (2012)Google Scholar
  34. 34.
    Brunette, G., Mogull, R.: Security guidance for critical areas of focus in cloud computing V2. 1. (2009)
  35. 35.
    Caires, L., Cardelli, L.: A spatial logic for concurrency (part I). Inf. Comput. 186(2), 194–235 (2003)zbMATHMathSciNetCrossRefGoogle Scholar
  36. 36.
    Cameron, K., Posch, R., Rannenberg, K.: Proposal for a common identity framework: a user-centric identity metasystem. (2008)
  37. 37.
    Cardelli, L.: Mobility and security. In: Bauer, F.L., Steinbrüggen, R. (eds.) Foundations of Secure Computation Proceedings of the NATO Advanced Study Institute. Lecture Notes for Marktoberdorf Summer School 1999 (A summary of several Ambient Calculus papers), pp. 3–37. IOS Press, Amsterdam (1999)Google Scholar
  38. 38.
    Cardelli, L., Gordon, A.D.: Mobile ambients. Theor. Comput. Sci. 240(1), 177–213 (2000)zbMATHMathSciNetCrossRefGoogle Scholar
  39. 39.
    Cardelli, L., Gordon, A.D.: Anytime, anywhere: modal logics for mobile ambients. In: In POPL ’00: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 365–377. ACM (2000)Google Scholar
  40. 40.
    Castillo, G.: The asm workbench: a tool environment for computer-aided analysis and validation of abstract state machine models. In: Margaria, T., Yi, W. (eds.) Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science, vol. 2031, pp. 578–581. Springer, Berlin/Heidelberg (2001). doi: 10.1007/3-540-45319-9_40.
  41. 41.
    Charatonik, W., Gordon, A., Talbot, J.M.: Finite-control mobile ambients. In: Métayer, D.L. (ed.) Programming Languages and Systems. Lecture Notes in Computer Science, vol. 2305, pp. 295–313. Springer, Berlin/Heidelberg (2002). doi: 10.1007/3-540-45927-8_21.
  42. 42.
    Chauvel, F., Ferry, N., Morin, B., Rossini, A., Solberg, A.: Models@Runtime to support the iterative and continuous design of autonomous reasoners. In: Bencomo, N., France, R., Götz, S., Rumpe, B. (eds.) MRT 2013: 8th International Workshop on Models@run.time at MODELS 2013: ACM/IEEE 14th International Conference on Model Driven Engineering Languages and Systems. CEUR Workshop Proceedings (2013)Google Scholar
  43. 43.
    Chelemen, R.M.: Modeling a web application for cloud content adaptation with asms. In: International Conference on Cloud Computing and Big Data (CloudCom-Asia), 2013, pp. 44–51 (2013). doi: 10.1109/CLOUDCOM-ASIA.2013.76 Google Scholar
  44. 44.
    Chipperfield, R.: An introduction to cross-platform mobile development technologies. (2012)
  45. 45.
    Christian-Albrechts-Universität zu Kiel: Visual programming of databases - visual sql. (2008)
  46. 46.
    Cloud Security Alliance: Top threats to cloud computing. (2010)
  47. 47.
    Cremin, R.: Mobile web content adaptation techniques. (2011)
  48. 48.
    Cremin, R., Passani, L.: Server-side device detection: history, benefits and how-to. (2012)
  49. 49.
    Dam, M.: Model checking mobile processes. In: Best, E. (ed.) CONCUR’93, 4th International Conference on Concurrency Theory. Lecture Notes in Computer Science, vol. 715, pp. 22–36. Swedish Institute of Computer Science/Springer, Kista/Berlin/Heidelberg (1993). Full version in Research Report R94:01Google Scholar
  50. 50.
    Dhamija, R., Dusseault, L.: The seven flaws of identity management: usability and security challenges. IEEE Secur. Priv. 6(2), 24 –29 (2008). doi: 10.1109/MSP.2008.49 CrossRefGoogle Scholar
  51. 51.
    Dold, A.: A formal representation of abstract state machines using pvs. Technical report, University Ulm (1998)Google Scholar
  52. 52.
    ENISA: Cloud computing. benefits, risks and recommendations for information security. Technical report, The European Network and Information Security Agency. (2009)
  53. 53.
    Farahbod, R., Glässer, U., Ma, G.: Model checking coreasm specifications. In: Proceedings of the 14th International Abstract State Machines Workshop (ASM’07) (2007)Google Scholar
  54. 54.
    Gargantini, A., Riccobene, E.: Encoding abstract state machines in pvs. In: Gurevich, Y., Kutter, P., Odersky, M., Thiele, L. (eds.) Abstract State Machines: Theory and Applications. Lecture Notes in Computer Science, vol. 1912, pp. 303–322. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  55. 55.
    Gargantini, A., Riccobene, E., Scandurra, P.: A metamodel-based language and a simulation engine for abstract state machines. J. Univers. Comput. Sci. 14(12), 1949–1983 (2008)Google Scholar
  56. 56.
    Gervasi, V.: An asm model of concurrency in a web browser. In: Derrick, J., Fitzgerald, J., Gnesi, S., Khurshid, S., Leuschel, M., Reeves, S., Riccobene, E. (eds.) Abstract State Machines, Alloy, B, VDM, and Z. Lecture Notes in Computer Science, vol. 7316, pp. 79–93. Springer, Berlin/Heidelberg (2012). doi: 10.1007/978-3-642-30885-7_6.
  57. 57.
    Google: Google apps for business. (2014)
  58. 58.
    Google Chrome: What are extensions?. (2013)
  59. 59.
    Google Developers: Google web toolkit. (2013)
  60. 60.
    Google Developers: Google app engine: platform as a service. (2014)
  61. 61.
    Gordon, A.D., Cardelli, L.: Equational properties of mobile ambients. Math. Struct. Comp. Sci. 13, 371–408 (2003). doi: 10.1017/S0960129502003742.
  62. 62.
    Grigsby, J.: Responsive design for apps. (2013)
  63. 63.
    Gunjan, K., Sahoo, G., Tiwari, R.K.: Identity management in cloud computing - a review. Int. J. Bus. Forecast. Market. Intell. 1(4) (2012).
  64. 64.
    Gurevich, Y.: Evolving algebra 1993: Lipari guide. In: International Conference on Functional Programming, pp. 9–36. Oxford University Press, New York (1994)Google Scholar
  65. 65.
    Gurevich, Y.: Sequential abstract state machines capture sequential algorithms. ACM Trans. Comput. Logic 1, 77–111 (2000). doi:
  66. 66.
    Jaakkola, H., Thalheim, B.: Visual SQL – high-quality ER-based query treatment. In: Jeusfeld, M.A., Pastor, O. (eds.) Conceptual modeling for novel application domains. In: Proceedings of ER 2003 Workshops ECOMO, IWCMQ, AOIS, and XSDM, Chicago, IL, 13 October 2003. Lecture Notes in Computer Science, vol. 2814, pp. 129–139. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  67. 67.
    Jarraya, Y., Eghtesadi, A., Debbabi, M., Zhang, Y., Pourzandi, M.: Cloud calculus: security verification in elastic cloud computing platform. In: Smari, W.W., Fox, G.C. (eds.) CTS, pp. 447–454. IEEE, Denver (2012).
  68. 68.
    Juric, M.B.: Business Process Execution Language for Web Services BPEL and BPEL4WS, 2nd edn. Packt Publishing, Birmingham (2006)Google Scholar
  69. 69.
    Kappel, G.: Chapter I: Web applications. University Lecture. (2012)
  70. 70.
    Kozen, D.: Kleene algebra with tests. Trans. Program. Lang. Syst. 19(3), 427–443 (1997)CrossRefGoogle Scholar
  71. 71.
    Kumar, V., Kumar, A.: Client device based content adaptation using rule base. J. Comput. Sci. 7(12), 1908–1913 (2011)CrossRefGoogle Scholar
  72. 72.
    LastPass: Lastpass—the last password you have to remember. (2013)
  73. 73.
    Loke, S.W., Krishnaswamy, S., Naing, T.T.: Service domains for ambient services: concept and experimentation. Mob. Netw. Appl. 10(4), 395–404 (2005).
  74. 74.
    Louridas, P.: Orchestrating web services with BPEL. IEEE Softw. 25(2), 85–87 (2008).
  75. 75.
    Ma, H., Schewe, K.D., Thalheim, B., Wang, Q.: Abstract state services. In: Object-Oriented and Entity-Relationship Modelling/International Conference on Conceptual Modeling/The Entity Relationship Approach, pp. 406–415 (2008). doi: 10.1007/978-3-540-87991-6_48
  76. 76.
    Ma, H., Schewe, K.D., Thalheim, B., Wang, Q.: Composing personalised services on top of abstract state services. In: Delcambre, L., Kaschek, R.H., Mayr, H.C. (eds.) The Evolution of Conceptual Modeling, no. 08181 in Dagstuhl Seminar Proceedings. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Dagstuhl (2008).
  77. 77.
    Ma, H., Schewe, K.D., Thalheim, B., Wang, Q.: A theory of data-intensive software services. Serv. Orient. Comput. Appl. 3(4), 263–283 (2009)CrossRefGoogle Scholar
  78. 78.
    Ma, H., Schewe, K.D., Thalheim, B., Wang, Q.: A formal model for the interoperability of service clouds. Service Oriented Computing and Applications 6(3), 189–205 (2012). doi: 10.1007/s11761-012-0101-7.
  79. 79.
    Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc., Sebastopol (2009)Google Scholar
  80. 80.
    Mell, P., Grance, T.: The nist definition of cloud computing. (2011)
  81. 81.
    Microsoft: Office 365. (2014)
  82. 82.
    Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, parts I and II. Inform. Comput. 100(1), 1–77 (1992). doi: 10.1016/0890-5401(92)90008-4.
  83. 83.
    Nida, P., Dhiman, H., Hussain, S.: A survey on identity and access management in cloud computing. Int. J. Eng. Res. Technol. 3(4) (2014).
  84. 84.
  85. 85.
    Offutt, J.: Web software applications quality attributes. In: Quality Engineering in Software Technology (CONQUEST 2002), pp. 187–198 (2002).
  86. 86.
    OpenDDR LLC: Openddr - the best open and completely free device description repository with access apis available worldwide. (2013)
  87. 87.
    Oppliger, R., Gajek, S., Hauser, R.: Security of microsoft’s identity metasystem and cardspace. In: ITG-GI Conference Communication in Distributed Systems (KiVS), pp. 1–12 (2007)Google Scholar
  88. 88.
    Prodromou, E.: Openid privacy concerns. (2007)
  89. 89.
    Pusch, C.: Verification of compiler correctness for the wam. In: von Wright, J., Grundy, J., Harrison, J. (eds.) Theorem Proving in Higher Order Logics (TPHOLs’96). Lecture Notes in Computer Science, vol. 1125, pp. 347–362. Springer, Berlin (1996)CrossRefGoogle Scholar
  90. 90.
    Reichl, D.: Keepass password safe. (2013)
  91. 91.
    Reiger, B., Rieger, S.: Adaptation: why responsive design actually begins on the server. (2012)
  92. 92.
    Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: The emperor’s new security indicators. In: IEEE Symposium on Security and Privacy, 2007. SP ’07, pp. 51–65 (2007). doi: 10.1109/SP.2007.35
  93. 93.
    Schellhorn, G.: Verifikation Abstrakter Zustandsmaschinen. Ph.D. thesis, University Ulm (1999)Google Scholar
  94. 94.
    Schewe, K.D., Thalheim, B.: Reasoning about web information systems using story algebras. In: Advances in Databases and Information Systems, ADBIS, pp. 54–66 (2004)Google Scholar
  95. 95.
    Schewe, K.D., Thalheim, B.: Conceptual modelling of web information systems. Data Knowl. Eng. 54(2), 147–188 (2005)CrossRefGoogle Scholar
  96. 96.
    Schewe, K.D., Thalheim, B.: Personalisation of web information systems: a term rewriting approach. Data Knowl. Eng. 62(1), 101–117 (2007). doi: 10.1016/j.datak.2006.07.007.
  97. 97.
    Schewe, K.D., Thalheim, B.: Term rewriting for web information systems: termination and Church-Rosser property. In: Proceedings of the 8th International Conference on Web Information Systems Engineering, WISE’07, pp. 261–272. Springer, Berlin/Heidelberg (2007).
  98. 98.
    Schewe, K.D., Wang, Q.: A customised ASM thesis for database transformations. Acta Cybern. 19(4), 765–805 (2010).
  99. 99.
    Schewe, K.D., Bosa, K., Lampesberger, H., Ma, J., Rady, M., Vleju, B.: Challenges in cloud computing. Scal. Comput. Pract. Exp. 12(4), 385–390 (2011)Google Scholar
  100. 100.
    ScientiaMobile, Inc: Wurfl - mobile device database by scientiamobile. (2013)
  101. 101.
    Sermersheim, J.: Lightweight directory access protocol (ldap): the protocol. RFC. (2006)
  102. 102.
    Service Oriented Architecture Modeling Language (SoaML): Specification for the UML Profile and Metamodel for Services (UPMS) Revised Submission. OMG document: ptc/2009-04-01 (2009)Google Scholar
  103. 103.
    Shaarawy, M.: Cloudification of visual sql. Master’s thesis, Johannes Kepler University Linz (2013)Google Scholar
  104. 104.
    Song, H., Compton, K.J.: Verifying π-calculus processes by promela translation. Technical report, Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor (2003)Google Scholar
  105. 105.
    Spielmann, M.: Abstract state machines: verification problems and complexity. Ph.D. thesis, RWTH Aachen (2000)Google Scholar
  106. 106.
    Spielmann, M.: Model checking abstract state machines and beyond. In: Proceedings of the International Workshop on Abstract State Machines, Theory and Applications, ASM ’00, pp. 323–340. Springer, London (2000).
  107. 107.
    Stärk, R.F., Nanchen, S.: A logic for abstract state machines. J. Univers. Comput. Sci. 7(11), 980–1005 (2001)Google Scholar
  108. 108.
    Stärk, R.F., Schmid, J., Börger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  109. 109.
    Sturrus, E.: Identity and access management in a cloud computing environment. Master’s thesis, Econometric Institute, Erasmus School of Economics, Erasmus University Rotterdam (2011).
  110. 110.
    Tanaka, Y.: Meme Media and Meme Market Architectures: Knowledge Media for Editing, Distributing, and Managing Intellectual Resources. Wiley, New York (2003).
  111. 111.
    Thalheim, B.: Visual SQL: towards ER-based object-relational database querying. In: Proceedings of the 27th International Conference on Conceptual Modeling, ER ’08, pp. 520–521. Springer, Berlin/Heidelberg (2008). doi: 10.1007/978-3-540-87877-3_41.
  112. 112.
    The Open Group Identity Management Work Area: Identity management. (2004)
  113. 113.
    Valente, M., Bigonha, R., Loureiro, A., Maia, M.: Abstractions for mobile computation in ASM. In: Graham, P., Maheswaran, M. (eds.) Proceedings of the International Conference on Internet Computing, IC 2000, 26–29 June, pp. 165–172. CSREA Press, Las Vegas (2000)Google Scholar
  114. 114.
    Venters, W., Whitley, E.A.: A critical review of cloud computing: researching desires and realities. J. Inf. Tech. 27(3), 179–197 (2012)CrossRefGoogle Scholar
  115. 115.
    Vleju, M.B.: A client-centric asm-based approach to identity management in cloud computing. In: Advances in Conceptual Modeling. Lecture Notes in Computer Science, vol. 7518, pp. 34–43. Springer, Berlin/Heidelberg (2012). doi: 10.1007/978-3-642-33999-8_5.
  116. 116.
    Vleju, M.B.: A client-centric identity management tool for small and medium enterprises using cloud services. In: 4th Workshop on Software Services, pp. 15–19. Bled, Slovenia (2012).
  117. 117.
    Vleju, M.B.: Interaction of the idmm with a client-side identity management component. Technical report, Christian Doppler Laboratory for Client-Centric Cloud Computing (CDCC), Johannes Kepler University Linz, Hagenberg (2012)Google Scholar
  118. 118.
    Vleju, M.B.: IdMM demo. (2013)
  119. 119.
    Vleju, M.B.: A practical implementation of a client-centric identity management tool for cloud computing. In: EUROCAST-Computer Aided Systems Theory, Gran Canaria (2013)Google Scholar
  120. 120.
    Vleju, M.B.: Automatic authentication to cloud-based services. J. Univers. Comput. Sci. 20(3), 385–405 (2014).
  121. 121.
    Winter, K.: Model checking for abstract state machines. Ph.D. thesis, Technical University of Berlin (2001)Google Scholar
  122. 122.
    Yaghoubi Shahir, H., Farahbod, R., Glässer, U.: Refactoring abstract state machine models. In: Derrick, J., Fitzgerald, J., Gnesi, S., Khurshid, S., Leuschel, M., Reeves, S., Riccobene, E. (eds.) Abstract State Machines, Alloy, B, VDM, and Z. Lecture Notes in Computer Science, vol. 7316, pp. 345–348. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-30885-7_28.
  123. 123.
    Yang, S.H., Zhang, J., Huang, A., Tsai, J.P., Yu, P.: A context-driven content adaptation planner for improving mobile internet accessibility. In: IEEE International Conference on Web Services, 2008. ICWS ’08, pp. 88–95 (2008). doi: 10.1109/ICWS.2008.31.
  124. 124.
    Zhang, Y., Chen, J.L.: Universal identity management model based on anonymous credentials. In: IEEE International Conference on Services Computing (SCC), pp. 305–312 (2010). doi: 10.1109/SCC.2010.46
  125. 125.
    Zhang, X., Li, X., Luo, W.: Aka protocol and its formal analysis and verification using ambient calculus and logics. In: International Conference on Networking and Digital Society, vol. 1, pp. 194–197 (2009). doi:

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Károly Bósa
    • 1
    Email author
  • Roxana-Maria Holom
    • 1
  • Mircea Boris Vleju
    • 1
  1. 1.Christian Doppler Laboratory for Client-Centric Cloud ComputingJohannes Kepler University LinzHagenbergAustria

Personalised recommendations