메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 801-807

Scalable security and accounting services for content-based publish/subscribe systems

Author keywords

Electronic Commerce; Publish subscribe systems; Security

Indexed keywords

ELECTRONIC COMMERCE; PUBLISHING;

EID: 33644536683     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1066677.1066862     Document Type: Conference Paper
Times cited : (39)

References (23)
  • 7
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • E.Bertino and E. Ferrari, "Secure and selective dissemination of XML documents", ACM Transaction Info. Syst. Secur. 5(3): 290-331, 2002.
    • (2002) ACM Transaction Info. Syst. Secur. , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 8
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Proceedings of Crypto' 97, Springer-Verlag
    • D. Boneh and M. Franklin, "Efficient generation of shared RSA keys", in Proceedings of Crypto' 97, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, pp. 425-439, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 11
    • 85084160476 scopus 로고    scopus 로고
    • Defective sign and encrypt in S/MIME, PKCS7, MOSS, PEM, PGP, and XML
    • General Track
    • D. Davis, "Defective Sign and Encrypt in S/MIME, PKCS7, MOSS, PEM, PGP, and XML", USENIX Annual Technical Conference, General Track, 2001.
    • (2001) USENIX Annual Technical Conference
    • Davis, D.1
  • 14
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on the discrete logarithm
    • T. E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm", IEEE Transactions of Information Theory, pages 31(4): 469-472, 1985.
    • (1985) IEEE Transactions of Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1
  • 16
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99)
    • M. Jakobsson, "On quorum controlled asymmetric proxy re-encryption", in Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), volume 1560 of Lecture Notes in Computer Science, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1560
    • Jakobsson, M.1
  • 18
    • 85084164565 scopus 로고    scopus 로고
    • Secure distribution of events in content-based publish subscribe systems
    • August
    • L. Opyrchal and A. Prakash, "Secure Distribution of Events in Content-Based Publish Subscribe Systems", in Proceedings of the 10th USENIX Security Symposium, pages 281-295, August 2001.
    • (2001) Proceedings of the 10th USENIX Security Symposium , pp. 281-295
    • Opyrchal, L.1    Prakash, A.2
  • 19
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Advances in Cryptology - EUROCRYPT'91, Springer-Verlag
    • T. P. Pederson, "A threshold cryptosystem without a trusted party", in Advances in Cryptology - EUROCRYPT'91, vol 547 of Lecture Notes in Computer Science, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547
    • Pederson, T.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.