TY - GEN
T1 - In-broker access control
T2 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
AU - Li, Fengjun
AU - Luo, Bo
AU - Liu, Peng
AU - Lee, Dongwon
AU - Mitra, Prasenjit
AU - Lee, Wang Chien
AU - Chu, Chao Hsien
PY - 2006
Y1 - 2006
N2 - An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is taken-for-granted as the "right" thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the "whole" system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is "pushed" from the boundary into the "heart" of the information brokerage system.
AB - An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is taken-for-granted as the "right" thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the "whole" system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is "pushed" from the boundary into the "heart" of the information brokerage system.
UR - http://www.scopus.com/inward/record.url?scp=33845397197&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33845397197&partnerID=8YFLogxK
U2 - 10.1109/SUTC.2006.1636183
DO - 10.1109/SUTC.2006.1636183
M3 - Conference contribution
AN - SCOPUS:33845397197
SN - 0769525539
SN - 9780769525532
T3 - Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
SP - 252
EP - 259
BT - Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
Y2 - 5 June 2006 through 7 June 2006
ER -