In-broker access control: Towards efficient end-to-end performance of information brokerage systems

Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang Chien Lee, Chao Hsien Chu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is taken-for-granted as the "right" thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the "whole" system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is "pushed" from the boundary into the "heart" of the information brokerage system.

Original languageEnglish
Title of host publicationProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
Pages252-259
Number of pages8
Volume2006 II
DOIs
Publication statusPublished - 2006
Externally publishedYes
EventIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Taichung
Duration: 5 Jun 20067 Jun 2006

Other

OtherIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
CityTaichung
Period5/6/067/6/06

Fingerprint

Access control
Information systems
XML

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Li, F., Luo, B., Liu, P., Lee, D., Mitra, P., Lee, W. C., & Chu, C. H. (2006). In-broker access control: Towards efficient end-to-end performance of information brokerage systems. In Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (Vol. 2006 II, pp. 252-259). [1636183] https://doi.org/10.1109/SUTC.2006.1636183

In-broker access control : Towards efficient end-to-end performance of information brokerage systems. / Li, Fengjun; Luo, Bo; Liu, Peng; Lee, Dongwon; Mitra, Prasenjit; Lee, Wang Chien; Chu, Chao Hsien.

Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Vol. 2006 II 2006. p. 252-259 1636183.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Li, F, Luo, B, Liu, P, Lee, D, Mitra, P, Lee, WC & Chu, CH 2006, In-broker access control: Towards efficient end-to-end performance of information brokerage systems. in Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. vol. 2006 II, 1636183, pp. 252-259, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, 5/6/06. https://doi.org/10.1109/SUTC.2006.1636183
Li F, Luo B, Liu P, Lee D, Mitra P, Lee WC et al. In-broker access control: Towards efficient end-to-end performance of information brokerage systems. In Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Vol. 2006 II. 2006. p. 252-259. 1636183 https://doi.org/10.1109/SUTC.2006.1636183
Li, Fengjun ; Luo, Bo ; Liu, Peng ; Lee, Dongwon ; Mitra, Prasenjit ; Lee, Wang Chien ; Chu, Chao Hsien. / In-broker access control : Towards efficient end-to-end performance of information brokerage systems. Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Vol. 2006 II 2006. pp. 252-259
@inproceedings{556bcc5fa0f14c64b6c207f825ed616d,
title = "In-broker access control: Towards efficient end-to-end performance of information brokerage systems",
abstract = "An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is taken-for-granted as the {"}right{"} thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the {"}whole{"} system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is {"}pushed{"} from the boundary into the {"}heart{"} of the information brokerage system.",
author = "Fengjun Li and Bo Luo and Peng Liu and Dongwon Lee and Prasenjit Mitra and Lee, {Wang Chien} and Chu, {Chao Hsien}",
year = "2006",
doi = "10.1109/SUTC.2006.1636183",
language = "English",
isbn = "0769525539",
volume = "2006 II",
pages = "252--259",
booktitle = "Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing",

}

TY - GEN

T1 - In-broker access control

T2 - Towards efficient end-to-end performance of information brokerage systems

AU - Li, Fengjun

AU - Luo, Bo

AU - Liu, Peng

AU - Lee, Dongwon

AU - Mitra, Prasenjit

AU - Lee, Wang Chien

AU - Chu, Chao Hsien

PY - 2006

Y1 - 2006

N2 - An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is taken-for-granted as the "right" thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the "whole" system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is "pushed" from the boundary into the "heart" of the information brokerage system.

AB - An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is taken-for-granted as the "right" thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the "whole" system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is "pushed" from the boundary into the "heart" of the information brokerage system.

UR - http://www.scopus.com/inward/record.url?scp=33845397197&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33845397197&partnerID=8YFLogxK

U2 - 10.1109/SUTC.2006.1636183

DO - 10.1109/SUTC.2006.1636183

M3 - Conference contribution

AN - SCOPUS:33845397197

SN - 0769525539

SN - 9780769525532

VL - 2006 II

SP - 252

EP - 259

BT - Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing

ER -