Nothing Special   »   [go: up one dir, main page]

Skip to main content

Research on Security and Interoperability in Middleware

  • Conference paper
  • First Online:
Advances in Intelligent Networking and Collaborative Systems (INCoS 2017)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 8))

  • 1298 Accesses

Abstract

The interoperability between security services of different middleware platforms directly affect the degree of resource sharing in the distributed environment and business interoperability. The architecture and mechanism of CSIv2 are analyzed, an implementation scheme for security and interoperability based on interceptor technology is proposed. Finally, we implement the scheme on StarBus, a middleware platform. Test result shows correctness of the implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Object Manage Group: Common Object Request Broker Architecture: Core Specification v 2.4.0-v 3.0.2. OMG, 2015.12 20-35

    Google Scholar 

  2. Common Secure Interoperability Version 2 Request For Proposal, OMG, 2016.11 56-69

    Google Scholar 

  3. Klein, R., Rilling, S., Usov, A., Xie, J.: Using complex event processing for modelling and simulation of cyber-physical systems. Infrastructures 9(1/2), 148–172 (2013)

    Google Scholar 

  4. Mola, L., Rossignoli, C., Carugati, A., Giangreco, A.: Business intelligence system design and its consequences for knowledge sharing, collaboration, and decision-making: an exploratory study. Int. J. Technol. Hum. Interact. 11(4), 1–25 (2015)

    Article  Google Scholar 

  5. Mezghani, K., Ayadi, F.: Factors explaining is managers attitudes toward cloud computing adoption. Int. J. Technol. Hum. Interact. 12(1) 1–20 (2016)

    Google Scholar 

  6. Yuriyama, M., Kushida, T.: Integrated cloud computing environment with IT resources and sensor devices. Int. J. Space Based Situated Comput. (IJSSC) 1(2–3), 174–182 (2011). doi:10.1504/IJSSC.2011.040342

    Google Scholar 

  7. Boyinbode, O., Le, H., Takizawa, M.: A survey on clustering algorithms for wireless sensor networks. Int. J. Space Based Situated Comput. (IJSSC) 1(2–3), 137–150 (2011). doi:10.1504/IJSSC.2011.040339

  8. Di Stefano, A., Morana, G., Zito, D.: QoS-aware services composition in P2PGrid environments. Int. J. Grid Util. Comput. 2(2), 139–147 (2011). doi:10.1504/IJGUC.2011.040601

  9. Lee, E.A.: Cyber physical systems: design challenges. In: The 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC-2008), Orlando, Florida, USA, pp. 363–369, 5–7 May 2008

    Google Scholar 

  10. Lee, E.A.: The past, present and future of cyber-physical systems: a focus on models. Sensors 15, 4837–4869 (2015)

    Google Scholar 

  11. Guyeux, C., Makhoul, A., Atoui, I., Tawbi, S., Bahi, J.M.: A complete security framework for wireless sensor networks: theory and practice. Int. J. Inf. Technol. Web Eng. (IJITWE) 10(1), 47–74 (2015)

    Article  Google Scholar 

  12. Saripalle, R.K., Demurjian, S.A., Blechner, M., Agresta, T.: HOD2MLC: hybrid ontology design and development model with lifecycle. Int. J. Inf. Technol. Web Eng. (IJITWE) 10(2), 16–42 (2015)

    Google Scholar 

  13. Xingshe, Z., Yalei, Y., Gang, Y.: A method for cyber-physical system dynamic behavior modeling. Chin. J. Comput. 37(6), 1411–1423 (2014)

    Google Scholar 

  14. Zhou, C., Yin, Z., Feng, Y.: Events algebra of triggers. Comput. J., 1–10 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingfu Tuo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Zhou, C., Tuo, M., Tuo, M., Zhao, X., Wang, L. (2018). Research on Security and Interoperability in Middleware. In: Barolli, L., Woungang, I., Hussain, O. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-65636-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65636-6_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65635-9

  • Online ISBN: 978-3-319-65636-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics