- Published: September 15, 2022
- Updated: September 15, 2022
- University / College: Cornell University
- Level: Undergraduate
- Language: English
- Downloads: 9
Security of Brokerless Architectures By Security systems Security system that are used include content-based publish; secure goals and requirements, identity-based encryptions, numeric attributes and key generation for subscribers. Security systems that have been used such as secure event dissemination have ensured that publishing of event as are managed (Duncan, 2009). Cipher texts that are used in this system need to reflect back to the roots of attribute tree. Security is enhanced in the system since cipher texts are labelled each with a unique symbol.
Strengths of approach
Security system that have been used have made authentication possible (Duncan, 2009). Authentication has been used in the security system to avoid publication that is non-legible with only those that are authorised being able to publish events in the system. Confidentiality has been maintained in the system since events are only visible to subscribers and are protected from modification that is illegal. Confidentiality also makes subscriptions done by subscribers to be confidential and not able to be forged (John, 2010).
Weakness of approach
Scalability has made scaling with the number of people that are subscribers in the system. Key server has enabled maintenance of constant number of keys per transaction.
Weak notions have occurred reducing confidentiality since peers need to know subscriptions that are made by their parents. Parents also need to know subscriptions that are made by their children (John, 2010). Overlay maintenance should also be done in the right way such that credentials of subscribers are not confused making one to get to publications of others (Pesonen, Eyers and Bacon, (2007).
References
W. Pesonen, Eyers, and J. Bacon, (2007) “ Encryption-EnforcedAccess Control in Dynamic Multi-Domain Publish/SubscribeNetworks,” Proc. ACM Int’l Conf. Distributed Event-Based Systems (DEBS)
Press Duncan, T. (2009). Publishing security. Kidhaven
John R. (2010). Management of sites and publishing security. Oxford press