Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems 2010
DOI: 10.1145/1827418.1827425
|View full text |Cite
|
Sign up to set email alerts
|

Providing basic security mechanisms in broker-less publish/subscribe systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…However, computations are fast for networks with a small number of attributes, as they are common in many CEP applications. Since security-related event systems have, depending on the network and event parameters, a processing time in the range of one millisecond and more per event [19], [20], [9], we consider a latency of up to 1ms as acceptable for our approach. In our second evaluation, we leave the number of event sources fixed at two but varied the domain size (cf.…”
Section: Discussion and Evaluationmentioning
confidence: 99%
See 3 more Smart Citations
“…However, computations are fast for networks with a small number of attributes, as they are common in many CEP applications. Since security-related event systems have, depending on the network and event parameters, a processing time in the range of one millisecond and more per event [19], [20], [9], we consider a latency of up to 1ms as acceptable for our approach. In our second evaluation, we leave the number of event sources fixed at two but varied the domain size (cf.…”
Section: Discussion and Evaluationmentioning
confidence: 99%
“…that are registered in its domain). Current work in providing security for event-based systems covers already confidentiality of individual event streams and the authorization of network participants [9], [10], [11]. In CEP systems, however, the provider of an event looses control on the distribution of dependent event streams.…”
Section: Manufacturermentioning
confidence: 99%
See 2 more Smart Citations
“…This nicely corresponds to attribute-based access control (ABAC) [27] which allows access based on attributes of subject, object or environment. A clever adaptation to publish-subscribe networks has already been made in [24].…”
Section: Introductionmentioning
confidence: 99%