A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Decoupling Components of an Attack Prevention System Using Publish/Subscribe
[chapter]
Intelligence in Communication Systems
The cooperation between the different entities of this system has been efficiently solved through the use of a publish/subscribe model. ...
A global view of the whole system is necessary to react against the different actions of such an attack. ...
Autrel sharpened many of the arguments presented in this paper. The work of J. García and J. Borrell is funded by the Spanish Government CICYT Commission and the Catalan Government DURSI Ministry. ...
doi:10.1007/0-387-32015-6_9
dblp:conf/intellcomm/GarciaJMB05
fatcat:bvfgfrndejfznhzyjzy7t5hhlu
Confidentiality-Preserving Publish/Subscribe
2016
ACM Computing Surveys
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. ...
It provides an overview of the current challenges posed by confidentiality concerns and points to future research directions in this promising field. ...
An event owner is an entity who has the right to authorize actions over an event type, including publishing, subscribing, receiving and changing the policy of an event. ...
doi:10.1145/2940296
fatcat:dba4fatv2ffkrizjyhjjfihsoy
Anonymous Publish-Subscribe Systems
[chapter]
2015
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Publish-subscribe protocols offer a unique means of data distribution, that has many applications for distributed systems. ...
We concretely describe the properties of and propose a system that allows publish-subscribe based delivery, while protecting the identities of both the publishers and subscribers from each other, from ...
The most currently used publish-subscribe system is PubSubHubbub [10] . ...
doi:10.1007/978-3-319-23829-6_15
fatcat:6y3emv7fdvayxl5nqoz5paurwa
Towards Byzantine fault tolerant publish/subscribe
2013
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems - HotDep '13
We propose a Byzantine fault tolerant pub/sub system, on a tree-based overlay, tolerating a configurable number of failures in any part of the system, with minimal divergence from traditional pub/sub specifications ...
More than a decade of research has gone into techniques aimed at tolerating arbitrary failures in client/server interaction, using consensus based replication. ...
We refer to publishers, subscribers, and brokers as agents. ...
doi:10.1145/2524224.2524232
dblp:conf/hotdep/JehlM13
fatcat:hnjj4y2mq5cjtbcdy4spg7x77i
Authorization Using the Publish-Subscribe Model
2008
2008 IEEE International Symposium on Parallel and Distributed Processing with Applications
This paper presents the use of the publish-subscribe (pub-sub) model for delivering authorization requests and responses between the applications and the authorization servers. ...
Our analysis suggests that using the pub-sub architecture improves authorization system availability and reduces system administration overhead. ...
Members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) gave valuable feedback on the earlier drafts of this paper. ...
doi:10.1109/ispa.2008.126
dblp:conf/ispa/WeiRB08
fatcat:o7uvl46cn5e2xi2wbj5thex7wq
Securing publish-subscribe overlay services with EventGuard
2005
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
EventGuard comprises of two components. The first component is a suite of security guards that can be seamlessly plugged-into a content-based pub-sub system. ...
A publish-subscribe overlay service is a wide-area communication infrastructure that enables information dissemination across geographically scattered and potentially unlimited number of publishers and ...
Threat Model The pub-sub overlay service model comprises of three entities: publishers, subscribers and routing nodes. ...
doi:10.1145/1102120.1102158
dblp:conf/ccs/SrivatsaL05
fatcat:s75zsq7cfjcz5fvdaivqfslvyy
Publish/subscribe scheme for content centric MANETs
2016
Computer Science and Information Systems
In this paper, we firstly design a new Yaksha system on Elliptic Curve (EC-Yaksha), and then a secure Content Publish/Subscribe System based on EC-Yaksha (ECY-CPS) for CCMANET is proposed. ...
In addition, using of the license can efficiently defend common attacks such as the interest flooding and the content pollution etc. ...
Conclusion In this paper, we firstly develop an EC-Yaksha system. And then, a secure content publish/subscribe system ECY-CPS for CCMANET is proposed. ...
doi:10.2298/csis150320045g
fatcat:wd6tyljzsbdmvblq45qkcpgtwy
Roles and security in a publish/subscribe network architecture
2010
The IEEE symposium on Computers and Communications
Several publish/subscribe (pub/sub) and dataoriented networking proposals have been presented to overcome limitations of the current message-and host-centric Internet. ...
In this paper we examine roles of actors comprising an inter-domain pub/sub network, together with security requirements and minimal required trust associations arising from this setting. ...
From the security point of view, the rendezvous system is the most crucial component of the system. ...
doi:10.1109/iscc.2010.5546746
dblp:conf/iscc/LagutinVZBM10
fatcat:mxt4gstjunh7howc33dy7q3xju
Access control in publish/subscribe systems
2008
Proceedings of the second international conference on Distributed event-based systems - DEBS '08
A strength of publish/ subscribe is its many-to-many communication paradigm and loose coupling of components, so that publishers need not know the recipients of their data and subscribers need not know ...
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to the system by applications ...
Acknowledgements We acknowledge the support of the UK Engineering and Physical Sciences Research Council (EPSRC) via grants ED-SAC21 (GR/T28164), CareGrid (EP/C53718X) and TIME-EACM (EP/C547632). ...
doi:10.1145/1385989.1385993
dblp:conf/debs/BaconESP08
fatcat:e4rrf2ih6red7izmzowe6ju24y
Access Control in Decentralised Publish/Subscribe Systems
2007
Journal of Networks
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. ...
Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. ...
Decentralised Publish/Subscribe Systems A publish/subscribe system consists of publishers, subscribers, and an event service. ...
doi:10.4304/jnw.2.2.57-67
fatcat:3tdhzqorjjhljndcrjkfr7t5na
A security architecture for the publish/subscribe C-DAX middleware
2015
2015 IEEE International Conference on Communication Workshop (ICCW)
The C-DAX project aims at providing a cyber-secure publish/subscribe middleware tailored to the needs of smart grids. ...
The limited scalability, reliability, and security of today's utility communication infrastructures are main obstacles for the deployment of smart grid applications. ...
The authors alone are responsible for the content of this paper. ...
doi:10.1109/iccw.2015.7247573
dblp:conf/icc/HeimgaertnerHVP15
fatcat:mozvhfx7ubc5bkzvhv5boh3qxy
Securing restricted publisher-subscriber communications in smart grid substations
2018
2018 10th International Conference on Communication Systems & Networks (COMSNETS)
In this paper, we propose a secure and efficient data delivery scheme, based on a restricted yet dynamic publisher-subscriber architecture, for the published messages from a publisher to the subscribers ...
The scheme ensures that the published message is delivered from an authentic publisher to only those authorized subscribers by verifying publisher's signature and access structure of all subscribers. ...
An adversary also cannot retrieve the actual content of the message.
4) Prevention Against Impersonation Attack: In this section, we discuss how the proposed scheme prevents impersonation attack when ...
doi:10.1109/comsnets.2018.8328220
dblp:conf/comsnets/SaxenaGC18
fatcat:mdknhfmkarhklosrjlcyhqyvjm
Securing Mobile Agent Systems in Which the Agents Migrate via Publish/Subscribe Paradigm
2014
Lecture Notes on Software Engineering
Forcing the mobile agents to migrate via publish/subscribe paradigm brings the mobile agent systems a very high degree of scalability and flexibility by loosely coupling the communicating entities. ...
Because we load the security functionality on agents some special agents acting on behalf of their hosts protect the host systems. ...
Using topic based publish/subscribe paradigm for the underlying communication path as described in [1] provides a high degree of scalability and flexibility by decoupling the source and target entities ...
doi:10.7763/lnse.2014.v2.86
fatcat:cv37ayd7xng6ph3rtzrrduqvfm
Security Design for an Inter-Domain Publish/Subscribe Architecture
[chapter]
2011
Lecture Notes in Computer Science
Several new architectures have been recently proposed to replace the Internet Protocol Suite with a data-centric or publish/subscribe (pub/sub) network layer waist for the Internet. ...
If these new proposals are ever deployed as part of the public Internet as an essential building block of the infrastructure, they must be able to operate in a hostile environment, where a large number ...
Related Work This section covers related work for publish/subscribe systems and network layer security solutions. ...
doi:10.1007/978-3-642-20898-0_12
fatcat:sb56lbyrtjesreieq4dpr756ke
'Publish-subscribe grows up: support for management, visibility control, and heterogeneity
2006
IEEE Internet Computing
Message-oriented middleware is used to decouple the operation of cooperating applications. ...
The Rebeca publish-subscribe service uses scoping to structure both middleware and applications. ...
Deployment, orchestration, and management of these systems is then mostly considered as an afterthought. In this article, we introduce a scoping concept for structuring publish-subscribe systems. ...
doi:10.1109/mic.2006.17
fatcat:6sgtkqopkrfunfiz5aq23fasm4
« Previous
Showing results 1 — 15 out of 649 results