Business-Level Extensions for Event Repositories

  • Matthieu-P. SchapranowEmail author
Part of the In-Memory Data Management Research book series (IMDM)


In the following chapter, I introduce the developed transparent security extensions based on my implementation of HBAC. I refer to HBAC as all access control mechanisms that store a complete history of queries, analyze it, and perform decision taking based on its evaluations.


Supply Chain Round Robin Certificate Authority Simple Object Access Protocol Query History 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Global Standards 1, EPCIS Standard 1.0.1 (2007), Accessed 8 Mar 2012
  2. 2.
    OASIS Open, eXtensible Access Control Markup Language (XACML) V. 2.0. Feb 2005Google Scholar
  3. 3.
    SCHUFA Holding AG, Dept Compass: Empirical Indicators of Private Debt and Over-Indebtedness (2008), Accessed 8 Mar 2012
  4. 4.
    A.-K. Al Tamimi, Performance analysis of data encryption algorithms (2006), Accessed 8 Mar 2012
  5. 5.
    ODRL Initiative, ODRL V2.0—XML Encoding (2010), Accessed 8 Mar 2012
  6. 6.
    J. Sun, H. Zhao, H. Xiao, G. Hu. Lightweight public key infrastructure and service relation model for designing a trustworthy ONS. in Proceedings of the International Conference on Computer and Information Science, IEEE Computer Society, 2009, pp. 295–300Google Scholar
  7. 7.
    D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile (2008), Accessed 8 Mar 2012
  8. 8.
    Global Standards 1. EPCglobal Certificate Profile Specification Version 2.0 (2010), Accessed 8 Mar 2012
  9. 9.
    M.-P. Schapranow, A. Zeier, H. Plattner. Security extensions for improving data security of event repositories in EPCglobal networks. in Proceedings of the 9th International Conference on Ubiquitous, Computing, 2011Google Scholar
  10. 10.
    S.A Tanenbaum, Computer Networks, 4th edn. (Prentice Hall, Upper Saddle River, 2003)Google Scholar
  11. 11.
    Fosstrak, Project license (2009), Accessed 8 Mar 2012
  12. 12.
    Apache Software Foundation, Apache Tomcat 7.0.16 (2011), Accessed 8 Mar 2012
  13. 13.
    E. Gamma. Design Patterns: Elements of Reusable Object-oriented Software. (Addison-Wesley, Boston, 1995)Google Scholar
  14. 14.
    H. Plattner, A. Zeier. In-Memory Data Management: An Inflection Point for Enterprise Applications. (Springer, Heidelberg, 2011)Google Scholar
  15. 15.
    M.-P. Schapranow, J. Müller, A. Zeier, H. Plattner, RFID event data processing: an architecture for storing and searching. in Proceedings of the 4th International Workshop on RFID Technology—Concepts, Applications, Challenges, 2010Google Scholar
  16. 16.
    Intel Corporation. Intel Xeon processor 5600 series datasheet ( 2011), vol. 1, Accessed 8 Mar 2012
  17. 17.
    Intel Corporation. An introduction to the intel quick path interconnect (2009), Accessed 8 Mar 2012
  18. 18.
    Python Software Foundation, Python V. 2.7.2 Documentation (2012), Accessed 8 Mar 2012
  19. 19.
    C.S. French, Computer Science. Letts Higher Education List Series (Cengage Learning, 1996)Google Scholar
  20. 20.
    L. Pacioli, P. Crivelli, An Original Translation of the Treatise on Double-Entry Book-Keeping. (The Institute of Book-Keepers Ltd., New York, 1924)Google Scholar
  21. 21.
    M.-P. Schapranow, Transaction processing 2.0: the epochal change in designing transaction processing systems. Master’s thesis, Hasso Plattner Institute, 2008Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Hasso Plattner InstitutePotsdamGermany

Personalised recommendations