Securing publish/subscribe for multi-domain systems

作者: Jean Bacon , David Eyers , Ken Moody , Lauri Pesonen

DOI: 10.1007/11587552_1

关键词:

摘要: … police domain may define a role sergeant-on-duty and message … , subscribers and brokers hold public key pairs, bound to … Efficiency was not the main focus of our design; rather, we …

参考文章(30)
Shrideep Pallickara, Marlon E. Pierce, Ahmet E. Topcu, Ali Kaplan, Geoffrey C. Fox, Yi Huang, Yan Yan, Implementing a Prototype of the Security Framework for Distributed Brokering Systems. Security and Management. pp. 212- 218 ,(2003)
Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker, Replication strategies for highly available peer-to-peer storage Lecture Notes in Computer Science. pp. 153- 158 ,(2003) , 10.1007/3-540-37795-6_28
Atul Prakash, Lukasz Opyrchal, Secure distribution of events in content-based publish subscribe systems usenix security symposium. pp. 21- 21 ,(2001)
John D. Kubiatowicz, Anthony D. Joseph, Ben Y. Zhao, Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and University of California at Berkeley. ,(2001)
Roberto Baldoni, Mariangela Contenti, Antonino Virgillito, The evolution of publish/subscribe communication systems Lecture Notes in Computer Science. ,vol. 2584, pp. 137- 141 ,(2003) , 10.1007/3-540-37795-6_25
Ben Yanbin Zhao, John Kubiatowicz, Anthony D Joseph, Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing ,(2001)
T. Dierks, C. Allen, The TLS Protocol Version 1.0 IETF RFC 2246. ,vol. 2246, pp. 1- 80 ,(1999)
Yongdae Kim, Adrian Perrig, Gene Tsudik, Tree-based group key agreement ACM Transactions on Information and System Security. ,vol. 7, pp. 60- 96 ,(2004) , 10.1145/984334.984337
Peter R. Pietzuch, Jean Bacon, Peer-to-peer overlay broker networks in an event-based middleware Proceedings of the 2nd international workshop on Distributed event-based systems - DEBS '03. pp. 1- 8 ,(2003) , 10.1145/966618.966628
Jean Bacon, Ken Moody, Walt Yao, A model of OASIS role-based access control and its support for active security ACM Transactions on Information and System Security. ,vol. 5, pp. 492- 540 ,(2002) , 10.1145/581271.581276