Reference Hub2
Securing Event-Based Systems

Securing Event-Based Systems

Jean Bacon, David Eyers, Jatinder Singh
Copyright: © 2010 |Pages: 21
ISBN13: 9781605666976|ISBN10: 1605666971|ISBN13 Softcover: 9781616923051|EISBN13: 9781605666983
DOI: 10.4018/978-1-60566-697-6.ch006
Cite Chapter Cite Chapter

MLA

Bacon, Jean, et al. "Securing Event-Based Systems." Principles and Applications of Distributed Event-Based Systems, edited by Annika M. Hinze and Alejandro Buchmann, IGI Global, 2010, pp. 119-139. https://doi.org/10.4018/978-1-60566-697-6.ch006

APA

Bacon, J., Eyers, D., & Singh, J. (2010). Securing Event-Based Systems. In A. Hinze & A. Buchmann (Eds.), Principles and Applications of Distributed Event-Based Systems (pp. 119-139). IGI Global. https://doi.org/10.4018/978-1-60566-697-6.ch006

Chicago

Bacon, Jean, David Eyers, and Jatinder Singh. "Securing Event-Based Systems." In Principles and Applications of Distributed Event-Based Systems, edited by Annika M. Hinze and Alejandro Buchmann, 119-139. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-697-6.ch006

Export Reference

Mendeley
Favorite

Abstract

The scalability properties of event-based communication paradigms make them suitable for building large-scale distributed systems. For effective management at the application level, such systems often comprise multiple administrative domains, although their underlying communication infrastructure can be shared. Examples of such systems include those required by government and public bodies for domains such as healthcare, police, transport and environmental monitoring. We investigate how to build security into these systems. We outline point-to-point and publish/subscribe event-based communication, and examine security implications in each. Publish/subscribe decouples communicating entities. This allows for efficient event dissemination, however it makes controlling data visibility more difficult. Some data is sensitive and must be protected for personal and legal reasons. Large pub/sub systems distribute events using intermediate broker nodes. Some brokers may not be fully trusted. We discuss how selective encryption can effect security without impacting on content-based routing, and the implications of federated multi-domain systems.We discuss the specification of policy using role-based access control, and demonstrate how to enforce the security of the communications API and the broker network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.