Abstract

Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously carried out. The original Pipes and Filters pattern and the Parallel Pipes and Filters pattern describe those actions. We present here the Secure Pipes and Filters pattern as a secure version of the original patterns, which contains a minimal set of security mechanisms to provide a set of basic security functions. The Secure Pipes and Filters pattern includes ways to add security controls at each stage of processing, controlling that only predefined operations are applied to data streams, as well as securing data movement.


Original document

The different versions of the original document can be found in:

https://www.researchgate.net/profile/Eduardo_Fernandez8/publication/221646588_The_Secure_Pipes_and_Filters_Pattern/links/02bfe5115911b52090000000.pdf,
https://dblp.uni-trier.de/db/conf/dexaw/dexaw2009.html#FernandezO09,
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005337189,
https://ieeexplore.ieee.org/document/5337189,
https://dl.acm.org/citation.cfm?id=1674710,
https://www.computer.org/csdl/proceedings/dexa/2009/3763/00/3763a181.pdf,
https://academic.microsoft.com/#/detail/2106534692
http://dx.doi.org/10.1109/dexa.2009.55
Back to Top

Document information

Published on 01/01/2009

Volume 2009, 2009
DOI: 10.1109/dexa.2009.55
Licence: CC BY-NC-SA license

Document Score

0

Views 0
Recommendations 0

Share this document

Keywords

claim authorship

Are you one of the authors of this document?