"International Workshop on Distributed Event-Based Systems (DEBS 2004)" W18L Workshop - 26th International Conference on Softwa 2004
DOI: 10.1049/ic:20040381
|View full text |Cite
|
Sign up to set email alerts
|

Security aspects in publish/subscribe systems

Abstract: Publish/subscribe is emerging as a very flexible communication paradigm that is applicable to environments demanding scalable and evolvable architectures. Although considered for workflow, electronic commerce, mobile systems, and others, security issues have long been neglected in publish/subscribe systems. Recent advances address this issue, but only on a low, technical level. In this paper, we analyze the trust relationships between producers, consumers, and the notification infrastructure. We devise groups … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…Being content-based, CBR inherently requires brokers to access the content of messages, something that potentially breaks message confidentiality. Some initial proposals exists to overcome this limitation [31,74,61,58,67,44,54,53] but a fully scalable and efficient solution for secure communication in CBR networks has still to emerge. Moreover, the web services world has developed its own standards about security (i.e., WS-Security [51]), which should be integrated into the chosen CBR solution.…”
Section: Discussionmentioning
confidence: 99%
“…Being content-based, CBR inherently requires brokers to access the content of messages, something that potentially breaks message confidentiality. Some initial proposals exists to overcome this limitation [31,74,61,58,67,44,54,53] but a fully scalable and efficient solution for secure communication in CBR networks has still to emerge. Moreover, the web services world has developed its own standards about security (i.e., WS-Security [51]), which should be integrated into the chosen CBR solution.…”
Section: Discussionmentioning
confidence: 99%
“…Miklós describes a method to define access control policies on clients' advertisement and subscription filters [13], which assumes that the infra-structure is trusted. Fiege et al [4] attempted to address the level of trust between publishers, subscribers and infra-structure through the development of scopes of visibility. An implementation on the REBECA [15] shows how such a scoping approach might work.…”
Section: Related Workmentioning
confidence: 99%
“…A scope [11,12] is a grouping structure that bundles sets of pub/sub brokers and clients, constraining the visibility of events to its members. A scope sets the boundaries for transmission, allowing control over the propagation of events to other scopes.…”
Section: Related Workmentioning
confidence: 99%