{"title":"保护基于事件的系统","authors":"J. Bacon, D. Eyers, Jatinder Singh","doi":"10.4018/978-1-60566-697-6.CH006","DOIUrl":null,"url":null,"abstract":"This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter defence for an event-based system. The next section demonstrates mechanisms for implementing security within a large-scale distributed broker network, including discussion of aBsTRaCT","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Securing Event-Based Systems\",\"authors\":\"J. Bacon, D. Eyers, Jatinder Singh\",\"doi\":\"10.4018/978-1-60566-697-6.CH006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter defence for an event-based system. The next section demonstrates mechanisms for implementing security within a large-scale distributed broker network, including discussion of aBsTRaCT\",\"PeriodicalId\":253133,\"journal\":{\"name\":\"Principles and Applications of Distributed Event-Based Systems\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Principles and Applications of Distributed Event-Based Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-60566-697-6.CH006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Principles and Applications of Distributed Event-Based Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-60566-697-6.CH006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter defence for an event-based system. The next section demonstrates mechanisms for implementing security within a large-scale distributed broker network, including discussion of aBsTRaCT