2010
DOI: 10.1007/978-3-642-13446-3_5
|View full text |Cite
|
Sign up to set email alerts
|

xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement

Abstract: Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distributed across domains, but does not offer any concrete solution to integrate this security functionality so that it works across security services for organization-wide policies. In this paper, we propose xESB, an enhanced version of an Enterprise Message Bus (ESB), where we monitor and enforce preventive and reactive policies, both for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…Considerable research effort has been devoted to SFT, mostly, but not exclusively, for local Journal of Software Engineering and Applications (non-distributed) systems. See [31] for a survey. According to this research, SFT-measures are to be established by incorporating failure-handling code (henceforth "SFT-code") into the code of the original software; which may have to be done, systematically, in many parts of the system.…”
Section: Software Fault Tolerance (Sft)mentioning
confidence: 99%
“…Considerable research effort has been devoted to SFT, mostly, but not exclusively, for local Journal of Software Engineering and Applications (non-distributed) systems. See [31] for a survey. According to this research, SFT-measures are to be established by incorporating failure-handling code (henceforth "SFT-code") into the code of the original software; which may have to be done, systematically, in many parts of the system.…”
Section: Software Fault Tolerance (Sft)mentioning
confidence: 99%
“…Enforcement of usage control requirements has been done at the OS level [26,27,3], at the X11 level [4], for Java [11,12,28], the .NET CIL [13] and machine languages [14,15,29]; at the level of an enterprise service bus [16]; for dedicated applications such as the Internet Explorer [17] and in the context of digital rights management [18][19][20]. These solutions focus on one of the two aspects of the problem: either data flow tracking or event-driven usage control.…”
Section: Related Workmentioning
confidence: 99%
“…opened, (lines 12-15) at most 4 further times and within 30 seconds (1 timestep = 1 second) after the first use (lines [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27]; further attempts of opening the file will result in opening a predefined error message (lines 28-34).…”
Section: B1 Operating Systemmentioning
confidence: 99%
See 2 more Smart Citations