Security for middleware extensions: event meta-data for enforcing security policy

  • Authors:
  • Brian Shand;Jem Rashbass

  • Affiliations:
  • Unit C - Magog Court, Shelford Bottom, Cambridge;Unit C - Magog Court, Shelford Bottom, Cambridge

  • Venue:
  • Proceedings of the 2008 workshop on Middleware security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

As messaging middleware technology matures, users demand increasingly many features, leading to modular middleware architectures. However, extra complexity increases the risk of a security breach, arising from a vulnerability in one module or misconfiguration of the module linkages. This position paper presents a framework for enforcing security policies between middleware modules, which simultaneously facilitates co-design of application and middleware security. For example, a healthcare application might require (1) all clinical data to be encrypted in transit, (2) a log of all messages sent and delivered (revealing no disclosive patient information), and (3) parameterised role based access control on message delivery. In our framework, we can satisfy all of these requirements, even when each feature is implemented as a separate extension module: extensions tag events with meta-data, and this meta-data guides the enforcement of the security policy. Exposing this meta-data to applications can help to unite application and middleware security policy.