Database security
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Aurora: a new model and architecture for data stream management
The VLDB Journal — The International Journal on Very Large Data Bases
PIPES: a public infrastructure for processing and exploring streams
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
High-Availability Algorithms for Distributed Stream Processing
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Contract-based load management in federated distributed systems
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
An integration framework for sensor networks and data stream management systems
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Verifiable and private top-k monitoring
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Research issues in outlier detection for data streams
ACM SIGKDD Explorations Newsletter
Hi-index | 0.00 |
Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a general DSMS architecture and introduce security issues that need to be considered. To face the threats we develop an extended system architecture that provides the necessary security mechanisms. We descuss the chosen concepts and illustrate how they can be realized by various system components. Our design focus is, considering the unique properties of data stream engines, to keep the impact on existing system components as little as possible and to limit the effect on the overall performance to a minimum.