Proceedings of the Second International Conference on Distributed Event-Based Systems 2008
DOI: 10.1145/1385989.1385993
|View full text |Cite
|
Sign up to set email alerts
|

Access control in publish/subscribe systems

Abstract: Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to the system by applications. A strength of publish/ subscribe is its many-to-many communication paradigm and loose coupling of components, so that publishers need not know the recipients of their data and subscribers need not know the number and location of publishers. But some data is sensitive, and its visibility must be controlled ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 62 publications
(52 citation statements)
references
References 30 publications
(30 reference statements)
0
52
0
Order By: Relevance
“…Bacon et al [1] already explored access control based on contextual information in publish/subscribe systems; with more details, they focus on a Message Oriented Middleware (MOM) for large scale architectures with multiple administration domains. They use a dedicated security infrastructure for credential management (OA-SIS RBAC [2]).…”
Section: Access Control In Interaction Patternsmentioning
confidence: 99%
“…Bacon et al [1] already explored access control based on contextual information in publish/subscribe systems; with more details, they focus on a Message Oriented Middleware (MOM) for large scale architectures with multiple administration domains. They use a dedicated security infrastructure for credential management (OA-SIS RBAC [2]).…”
Section: Access Control In Interaction Patternsmentioning
confidence: 99%
“…Bacon et al [6] presented architecture which contains ad-ministration domains sharing a dedicated event-broker system. They had discovered this to be suitable for some applications.…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, event-based systems require fundamentally different approaches to security that reflect their heterogeneous and loosely coupled nature [2]. While event-based applications enable timely information sharing within and between autonomous administrative parts of a distributed system, this has to occur in a secure and constrained fashion.…”
Section: Introductionmentioning
confidence: 99%