Learn More
In this paper, we argue that there is a need for an event-based middleware to build large-scale distributed systems. Existing publish/subscribe systems still have limitations compared to invocation-based middlewares. We introduce Hermes, a novel event-based distributed middle-ware architecture that follows a type-and attribute-based publish/subscribe model.(More)
The SECURE project is investigating the design of security mechanisms for pervasive computing based on the human notion of trust. Our work addresses how entities that encounter each other in unfamiliar, pervasive computing environments can overcome initial suspicion to allow secure collaboration to take place. 1 Overview At present most substantial,(More)
For large-scale distributed applications such as internet-wide or ubiquitous systems, event-based communication is an effective messag-ing mechanism between components. In order to handle the large volume of events in such systems, composite event detection enables application components to express interest in the occurrence of complex patterns of events.(More)
OASIS is a role-based access control architecture for achieving secure interoperation of services in an open, distributed environment. Services define roles and implement formally specified policy for role activation and service use; users must present the required credentials, in the specified context, in order to activate a role or invoke a service. (More)
Overlay broker networks are an important part of an event-based middleware. In this paper, we investigate the requirements of overlay broker networks and argue that using peer-to-peer techniques for their creation and the content-based routing of events has many advantages. We support our claims with an experimental evaluation of Hermes, an event-based(More)
We describe an architecture for secure, independent , interworking services (Oasis). Each service is made responsible for the classiication of its clients into named roles, using a formal logic to specify precise conditions for entering each role. A client becomes authenticated by presenting credentials to a service that enable the service to prove that the(More)