scispace - formally typeset
Proceedings ArticleDOI

A survey of security middleware

Sun Ying
- pp 1-5
Reads0
Chats0
TLDR
The paper briefly introduced the structure of security middleware system, and prospected some valuable applications and summarized and illustrated the hot spots in detail, including the implementation methods of parallel securitymiddleware and vulnerability monitoring middleware.
Abstract
Nowadays, with the awareness of information security, the security middleware technology is spread among an expanding number of people. On one hand, the security middleware can provide users with simple, understandable and safe information security technologies. On the other hand, it can exert positive effect on setting up a series of standardized and common interface for manufactures, so that the products from different vendors can be used compatibly. The paper firstly briefly introduced the structure of security middleware system, and on this basis, prospected some valuable applications. In addition, summarized and illustrated the hot spots in detail, including the implementation methods of parallel security middleware and vulnerability monitoring middleware. Finally, according to these significant applications, proposed some meaningful prospects related to research directions.

read more

Citations
More filters
Proceedings Article

Proceedings of the 2008 workshop on Middleware security

TL;DR: The first workshop on Middleware Security (MidSec'08) as mentioned in this paper was held in Leuven, Belgium, on December 2, 2008, in association with the 9th ACM International Middleware Conference.
Journal Article

Research on Interoperability of PKI in E-government Services

TL;DR: The paper proposes the use of a middleware approach,namely the Transaction Delivery Layer (TDL) for addressing the interoperability challenge and suggests that the adoption of PKI for protecting electronic transactions will increase, and more organizations will establish their own PKI.
Journal Article

Studying the Security of Encrypted Electric Document Transmition

TL;DR: This paper analyse the security requirement of the Encrypted Electric Document Transmition System based on Spring, Hibernate and WebWork technic to provide effective authentication, access control, authorization, confidentiality,integrality and undeniable ability.
Journal Article

Architecture and Design Practice of A Security Middleware

Zeng Le
- 01 Jan 2005 - 
TL;DR: The architecture and concerned design of the security middleware can provide most secure services uniformly to multi-applications based on windows platform or Unix platform, such as data confidentiality, data integrity, non-repudiation and authentication.
Journal Article

Mobile Security Middleware Architecture in High Strength

TL;DR: The middleware architecture and its security mechanism, including the design of authentication and key agreement, is introduced, and the encryption algorithm and the scheme of integrity control is discussed.
References
More filters
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Proceedings ArticleDOI

Smart home research

TL;DR: This paper is a survey for smart home research, from definition to current research status, and gives a definition to smart home, and describes the smart home elements, typical research projects, smart home networksResearch status, smartHome appliances and challenges at last.
Proceedings ArticleDOI

A context-aware security architecture for emerging applications

TL;DR: This document provides a concrete realization of a generalized access control model that makes significant use of contextual information in policy definition by presenting a system-level service architecture, as well as early implementation experience with the framework.
Proceedings ArticleDOI

Cerberus: a context-aware security scheme for smart spaces

TL;DR: This work presents a ubiquitous security mechanism that integrates context-awareness with automated reasoning to perform authentication and access control in ubiquitous computing environments.
Book ChapterDOI

Context-Role based access control for context-aware application

TL;DR: In this article, a context-role based access control mechanism for context-aware applications is proposed, which supports security policy that is based on context information, in order to provide automating contextaware services.
Related Papers (5)