-
1
-
-
33646794983
-
Securing publish/subscribe for multi-domain systems
-
ACM/IFIP/USENIX. To appear
-
J. Bacon, D. M. Eyers, K. Moody, and L. I. Pesonen. Securing publish/subscribe for multi-domain systems. In Proc. of the 6th International Middleware Conference (MW'05), Grenoble, France, Nov. 2005. ACM/IFIP/USENIX. To appear.
-
Proc. of the 6th International Middleware Conference (MW'05), Grenoble, France, Nov. 2005
-
-
Bacon, J.1
Eyers, D.M.2
Moody, K.3
Pesonen, L.I.4
-
2
-
-
84929938473
-
Role-based access control for publish/subscribe middleware architectures
-
ACM
-
A. Belokosztolszki, D. M. Eyers, P. R. Pietzuch, J. Bacon, and K. Moody. Role-based access control for publish/subscribe middleware architectures. In Proc. of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03), ACM SIGMOD, San Diego, CA, USA, June 2003. ACM.
-
Proc. of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03), ACM SIGMOD, San Diego, CA, USA, June 2003
-
-
Belokosztolszki, A.1
Eyers, D.M.2
Pietzuch, P.R.3
Bacon, J.4
Moody, K.5
-
3
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures (position paper)
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). In Proc. of the Cambridge 1998 Security Protocols International Workshop, volume 1550, pages 59-63, 1998.
-
(1998)
Proc. of the Cambridge 1998 Security Protocols International Workshop
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
4
-
-
0029700344
-
Decentralized trust management
-
IEEE
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. of the IEEE Conference on Security and Privacy, Oakland, CA, USA, May 1996. IEEE.
-
Proc. of the IEEE Conference on Security and Privacy, Oakland, CA, USA, May 1996
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
77953824347
-
-
CIS. SDSI (a simple distributed security infrastructure) Sept
-
CIS. SDSI (a simple distributed security infrastructure). http://theory.lcs.mit.edu/~cis/sdsi.html, Sept. 2001.
-
(2001)
-
-
-
6
-
-
0003981627
-
-
RFC 2692, Internet Engineering Task Force, Sept
-
C. Ellison. SPKI requirements. RFC 2692, Internet Engineering Task Force, Sept. 1999.
-
(1999)
SPKI Requirements
-
-
Ellison, C.1
-
7
-
-
0003593599
-
-
RFC 2693, Internet Engineering Task Force, Sept
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. SPKI certicate theory. RFC 2693, Internet Engineering Task Force, Sept. 1999.
-
(1999)
SPKI Certicate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylönen, T.6
-
12
-
-
84929887079
-
Peer-to-peer overlay broker networks in an event-based middleware
-
H. A. Jacobsen, editor ACM.
-
P. R. Pietzuch and J. Bacon. Peer-to-peer overlay broker networks in an event-based middleware. In H. A. Jacobsen, editor, Proc. of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03), ACM SIGMOD, San Diego, CA, USA, June 2003. ACM.
-
Proc. of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03), ACM SIGMOD, San Diego, CA, USA, June 2003
-
-
Pietzuch, P.R.1
Bacon, J.2
-
15
-
-
77953850174
-
PAST: A large-scale, persistent peer-to-peer storage utility
-
A. Rowstron and P. Druschel. PAST: A large-scale, persistent peer-to-peer storage utility. In HotOS VIII, Schoss Elmau, Germany, May 2001.
-
HotOS VIII, Schoss Elmau, Germany, May 2001
-
-
Rowstron, A.1
Druschel, P.2
-
17
-
-
84929315070
-
Security issues and requirements in internet-scale publish-subscribe systems
-
IEEE
-
C. Wang, A. Carzaniga, D. Evans, and A. L. Wolf. Security issues and requirements in internet-scale publish-subscribe systems. In Proc. of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02), Big Island, HI, USA, 2002. IEEE.
-
Proc. of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02), Big Island, HI, USA, 2002
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
-
18
-
-
26844578344
-
-
Technical report, Shandong University, Shandong, China
-
X. Wang, Y. L. Yin, and H. Yu. Collision search attacks on SHA1. Technical report, Shandong University, Shandong, China, 2005.
-
(2005)
Collision Search Attacks on SHA1
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
19
-
-
24944591357
-
How to break md5 and other hash functions
-
R. Cramer, editor, EUROCRYPT, of Springer
-
X. Wang and H. Yu. How to break md5 and other hash functions. In R. Cramer, editor, EUROCRYPT, volume 3494 of LNCS, pages 19-35. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
20
-
-
0003587596
-
-
World Wide Web Consortium Version 2.0, Apr.
-
World Wide Web Consortium. XML Path Language (XPath) Version 2.0, Apr. 2005.
-
(2005)
XML Path Language (XPath)
-
-
|