Skip to main content

Table 4 Comparison among tuple spaces approaches

From: Providing privacy on the tuple space model

 

Replication

Transaction

Access control

Confidentiality

Allows operations and searches over encrypted data

TSpaces [35]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

JavaSpaces [36]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

GigaSpaces [37]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

FT-Linda [12]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

Parallel-Linda [38]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

SecSpaces [10]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

KLAIM [9]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

SECOS [11]

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

\(\mathcal {X}\)

DepSpace [5]

\(\mathcal {X}\)

\(\mathcal {X}\)

DepSpace+this paper solutions

\(\mathcal {X}\)