A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A Flexible Security System for Metacomputing Environments
HPCN Europe '99 Proceedings of the 7th International Conference on High-Performance Computing and Networking
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Reputation System to Increase MIX-Net Reliability
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Implementing a NTP-based time service within a distributed middleware system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
On the Creation & Discovery of Topics in Distributed Publish/Subscribe Systems
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Scalable, fault-tolerant management in a service oriented architecture
Proceedings of the 16th international symposium on High performance distributed computing
Towards a secure rendezvous network for future publish/subscribe architectures
FIS'10 Proceedings of the Third future internet conference on Future internet
Enabling hierarchical dissemination of streams in content distribution networks
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
In this paper we present a framework for the secure end-to- end delivery of messages in distributed messaging infrastructures based on the publish/subscribe paradigm. The framework enables authorized publishing and consumption of messages. Brokers, which constitute individual nodes within the messaging infrastructure, also ensure that the dissemination of content is enabled only for authorized entities. The framework includes strategies to cope with attack scenarios such as denial of service attacks and replay attacks. Finally, we include experimental results from our implementation.