skip to main content
10.1145/1463342.1463346acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

A comparison of two approaches for achieving flexible and adaptive security middleware

Published: 02 December 2008 Publication History

Abstract

Open and dynamic business environments require flexible middleware that can be customized, adapted and reconfigured dynamically to face the changing environment and requirements. In this respect, the mechanism for composing middleware services with application code has an important impact on the kinds of adaptations that can be supported. This paper studies this problem in the context of security middleware. A bus-based architecture for integrating security middleware services is proposed and a qualitative comparison of the flexibility of the approach with an alternative AO-middleware-based approach is presented.

References

[1]
S. O. D. Beeck and J. Gregoire. A contract language for aspectual components. Master's thesis, Katholieke Universiteit Leuven, 2005.
[2]
K. Beznosov. On the benefits of decomposing policy engines into components. In ARM '04: Proceedings of the 3rd workshop on Adaptive and reflective middleware, pages 183--188, New York, NY, USA, 2004. ACM.
[3]
K. Beznosov, Y. Deng, B. Blakley, C. Burt, and J. Barkley. A resource access decision service for CORBA-based distributed systems. Proceedings of the 15th Annual Computer Security Applications Conference, page 310, 1999.
[4]
M. Fleury and F. Reverbel. The JBoss extensible server. In M. Endler and D. Schmidt, editors, Middleware 2003 --- ACM/IFIP/USENIX International Middleware Conference, volume 2672 of LNCS, pages 344--373. Springer-Verlag, 2003.
[5]
T. Goovaerts, B. De Win, and W. Joosen. Infrastructural support for enforcing and managing distributed application-level policies. Electronic Notes in Theoretical Computer Science, 197(1):31--43, Feb. 2008.
[6]
IBBT. PeCMan project (Personal Content MANagement). http://projects.ibbt.be/pecman, 2007.
[7]
F. Kon, F. Costa, G. Blair, and R. H. Campbell. The case for reflective middleware. Communications of the ACM, 45(6):33--38, 2002.
[8]
P. McDaniel and A. Prakash. A flexible architecture for security policy enforcement. DARPA Information Survivability Conference and Exposition, 2003. Proceedings, 2, 2003.
[9]
M. Mezini and K. Ostermann. Conquering aspects with caesar. pages 90--99, 2003.
[10]
P. Narasimban, L. Moser, and P. Melliar-Smith. Using interceptors to enhance corba. Computer, 32(7):62--68, Jul 1999.
[11]
Sun Microsystems. Java authorization contract for containers (JACC) version 1.0.
[12]
D. Suvée, W. Vanderperren, and V. Jonckers. Jasco: an aspect-oriented approach tailored for component based software development. pages 21--29, 2003.
[13]
T. Verhanneman, F. Piessens, B. De Win, and W. Joosen. Uniform application-level access control enforcement of organizationwide policies. Proceedings of the 21st Annual Computer Security Applications Conference, pages 431--440, 2005.

Cited By

View all
  • (2019)Message-oriented Middleware: A Review2019 5th International Conference on Big Data Computing and Communications (BIGCOM)10.1109/BIGCOM.2019.00023(88-97)Online publication date: Aug-2019
  • (2009)Adaptive security and trust management for autonomic message-oriented middleware2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems10.1109/MOBHOC.2009.5336915(810-817)Online publication date: Oct-2009
  • (2009)Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical SystemsProceedings of the 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns10.1109/ComputationWorld.2009.26(153-160)Online publication date: 15-Nov-2009

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MidSec '08: Proceedings of the 2008 workshop on Middleware security
December 2008
48 pages
ISBN:9781605583631
DOI:10.1145/1463342
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. aspect-oriented programming
  2. composition
  3. messaging
  4. middleware
  5. security service bus

Qualifiers

  • Research-article

Conference

Middleware '08

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Message-oriented Middleware: A Review2019 5th International Conference on Big Data Computing and Communications (BIGCOM)10.1109/BIGCOM.2019.00023(88-97)Online publication date: Aug-2019
  • (2009)Adaptive security and trust management for autonomic message-oriented middleware2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems10.1109/MOBHOC.2009.5336915(810-817)Online publication date: Oct-2009
  • (2009)Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical SystemsProceedings of the 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns10.1109/ComputationWorld.2009.26(153-160)Online publication date: 15-Nov-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media