DPSN: Decentralised Pub/Sub Network
  • Introduction
  • Why Decentralized?
  • Understanding Topics
  • Architecture
    • Topics Registry
    • Configurator
    • Clusters
    • Publishers and Subscribers
    • Facilitator Brokers
    • SDK
  • Functionality
    • Message Publishing and Delivery
    • Subscription Management
    • Security Considerations
    • Topic Ownership and Access Control
    • Private Key Authentication
    • Fully Homomorphic Encryption Support
  • Advantages and Use Cases
    • Advantages of DPSN
    • Use Cases
  • Integration
    • SDK Introduction
    • Publisher
    • Subscriber
    • Delegated Addresses
    • Private Messaging
  • Integration Guides
    • Messaging Application
  • Token Use
    • Utility
    • Token Utility Model
  • DIPs
    • DIP1: Stateless Message Routing in DPSN
  • DIP2: Integration of DPSN with Model Context Protocol (MCP)
  • DIP-3: Standardizing DPSN AVS for Enhanced Security and Reliability
Powered by GitBook
On this page
  1. Functionality

Topic Ownership and Access Control

Topic Ownership

  • Topic Creation: Users can create new topics by providing a unique identifier and relevant metadata.

  • Ownership Assignment: Upon creation, topic ownership is assigned to the creator.

  • Ownership Transfer: Topic ownership can be transferred to other users through secure and verifiable processes.

  • Ownership Verification: The network provides mechanisms to verify the ownership of a specific topic.

Access Control

  • Topic Permissions: Topic owners can define access permissions for different users or groups, granting read, write, or manage privileges.

  • Role-Based Access Control (RBAC): Different user roles (e.g., publisher, subscriber, administrator) are assigned specific permissions.

  • Access Control Lists (ACLs): Detailed access control lists can be defined to specify allowed actions for individual users or groups.

  • Inheritance: Topic permissions can be inherited by subtopics, simplifying access management.

Security Considerations

  • Ownership Verification: Strong cryptographic mechanisms are used to verify topic ownership, preventing unauthorized access.

  • Permission Enforcement: The network strictly enforces access control rules to protect topic data and prevent unauthorized actions.

  • Key Management: Secure key management practices are essential for managing access control credentials.

PreviousSecurity ConsiderationsNextPrivate Key Authentication

Last updated 8 months ago