Skip to main content

Table 4 Comparison among tuple spaces approaches

From: Providing privacy on the tuple space model

  Replication Transaction Access control Confidentiality Allows operations and searches over encrypted data
TSpaces [35] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
JavaSpaces [36] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
GigaSpaces [37] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
FT-Linda [12] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
Parallel-Linda [38] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
SecSpaces [10] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
KLAIM [9] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
SECOS [11] \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\) \(\mathcal {X}\)
DepSpace [5] \(\mathcal {X}\) \(\mathcal {X}\)
DepSpace+this paper solutions \(\mathcal {X}\)