Abstract
Complex event processing has become an important technology for big data and intelligent computing because it facilitates the creation of actionable, situational knowledge from potentially large amount events in soft realtime. Complex event processing can be instrumental for many mission-critical applications, such as business intelligence, algorithmic stock trading, and intrusion detection. Hence, the servers that carry out complex event processing must be made trustworthy. In this paper, we present a threat analysis on complex event processing systems and describe a set of mechanisms that can be used to control various threats. By exploiting the application semantics for typical event processing operations, we are able to design lightweight mechanisms that incur minimum runtime overhead appropriate for soft realtime computing.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS |
| Editors | M. Surendra Prasad Babu, Li Wenzheng, Eric Tsui |
| Place of Publication | usa |
| Publisher | IEEE Computer Society |
| Pages | 758-761 |
| Number of pages | 4 |
| ISBN (Electronic) | 9781479932788 |
| DOIs | |
| State | Published - Oct 21 2014 |
| Event | 2014 5th IEEE International Conference on Software Engineering and Service Science, ICSESS 2014 - Beijing, China Duration: Jun 27 2014 → Jun 29 2014 |
Conference
| Conference | 2014 5th IEEE International Conference on Software Engineering and Service Science, ICSESS 2014 |
|---|---|
| Country/Territory | China |
| City | Beijing |
| Period | 06/27/14 → 06/29/14 |
Keywords
- Big Data
- Business Intelligence
- Byzantine Fault Tolerance
- Complex Event Processing
- Dependable Computing
- Trust
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver