The IEEE Symposium on Computers and Communications 2010
DOI: 10.1109/iscc.2010.5546746
|View full text |Cite
|
Sign up to set email alerts
|

Roles and security in a publish/subscribe network architecture

Abstract: Several publish/subscribe (pub/sub) and dataoriented networking proposals have been presented to overcome limitations of the current message-and host-centric Internet. However, security issues of these solutions have not been addressed comprehensively. In this paper we examine roles of actors comprising an inter-domain pub/sub network, together with security requirements and minimal required trust associations arising from this setting. We then introduce and analyze a security design for a clean-slate pub/sub … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2010
2010
2016
2016

Publication Types

Select...
3
3
2

Relationship

4
4

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 15 publications
0
13
0
1
Order By: Relevance
“…This broker does not address any security issues, claiming that possibles solutions could include: plain authentication; Virtual Private Networks (VPNs); Access Control Lists (ACLs); as well as OAuth, a new type of authorization which is used to grant access to personal data by third-party applications (Hardt, 2012). In (Lagutin, Visala, Zahemszky, Burbridge, & Marias, 2010), the authors examine roles of different actors comprising an inter-domain publish/subscribe network, along with security requirements and minimal required trust associations between entities, introducing and analyzing an architecture that secures both data and control planes. The main security goals for a publish/subscribe architecture are: (i) integrity; (ii) scalability; (iii) availability, and iv) prevention of underived traffic.…”
Section: Security Issues In Cloud and Iot Publish/subscribe Scenariosmentioning
confidence: 99%
“…This broker does not address any security issues, claiming that possibles solutions could include: plain authentication; Virtual Private Networks (VPNs); Access Control Lists (ACLs); as well as OAuth, a new type of authorization which is used to grant access to personal data by third-party applications (Hardt, 2012). In (Lagutin, Visala, Zahemszky, Burbridge, & Marias, 2010), the authors examine roles of different actors comprising an inter-domain publish/subscribe network, along with security requirements and minimal required trust associations between entities, introducing and analyzing an architecture that secures both data and control planes. The main security goals for a publish/subscribe architecture are: (i) integrity; (ii) scalability; (iii) availability, and iv) prevention of underived traffic.…”
Section: Security Issues In Cloud and Iot Publish/subscribe Scenariosmentioning
confidence: 99%
“…PSIRP has also studied the security requirements for a publish-subscribe based Internet architecture [21], as well as the possibilities for applying existing work on cryptographic protocol analysis in a pure publish-subscribe architecture [23]. Moreover, new security mechanisms have been developed.…”
Section: Key Outcomesmentioning
confidence: 99%
“…Since the preliminary version of our work was published in [30], there have been a few related works. Some security designs for pub/sub network architecture was proposed in [12,26], but they did not have formal security proofs.…”
Section: New Improvements and Comparison To Our Previous Workmentioning
confidence: 99%