A Security Review of Event-Based Application Function and Service Component Architecture

A Security Review of Event-Based Application Function and Service Component Architecture

Faisal Nabi, Jianming Yong, Xiaohui Tao
Copyright: © 2020 |Volume: 11 |Issue: 2 |Pages: 13
ISSN: 2640-4265|EISSN: 2640-4273|EISBN13: 9781799809180|DOI: 10.4018/IJSSSP.2020070104
Cite Article Cite Article

MLA

Nabi, Faisal, et al. "A Security Review of Event-Based Application Function and Service Component Architecture." IJSSSP vol.11, no.2 2020: pp.58-70. http://doi.org/10.4018/IJSSSP.2020070104

APA

Nabi, F., Yong, J., & Tao, X. (2020). A Security Review of Event-Based Application Function and Service Component Architecture. International Journal of Systems and Software Security and Protection (IJSSSP), 11(2), 58-70. http://doi.org/10.4018/IJSSSP.2020070104

Chicago

Nabi, Faisal, Jianming Yong, and Xiaohui Tao. "A Security Review of Event-Based Application Function and Service Component Architecture," International Journal of Systems and Software Security and Protection (IJSSSP) 11, no.2: 58-70. http://doi.org/10.4018/IJSSSP.2020070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The term service component is derived from SCA (service component architecture) for event based distributed system design. Although service component pattern offers composite application development and support application reusability functionality. However, security in event based communication in components interaction model mostly discussed on upper layer in SCA while developing service oriented component application logic. This layer is called application business process logic layer, which produces the application's rendering logic, having being authenticated from ACL.The need for such a comprehensive security review is required in this field that could possibly elaborate the issues in composite application and Event based attack in service component architecture model. The paper achieves this target by analysing, reviewing the security issues, modelling techniques in service component application functionality, while application components, that produces, consume, and processing events.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.