메뉴 건너뛰기




Volumn 2, Issue 2, 2007, Pages 57-67

Access control in decentralised publish/subscribe systems

Author keywords

[No Author keywords available]

Indexed keywords

MESSAGE PASSING; NETWORK SECURITY; PUBLISHING;

EID: 36549013845     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.2.2.57-67     Document Type: Article
Times cited : (24)

References (22)
  • 2
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area event notification service
    • Aug. 2001
    • A. Carzaniga, D. S. Rosenblum, and A. L. Wolf, "Design and evaluation of a wide-area event notification service," ACM Transactions on Computer Systems, vol. 19, no. 3, pp. 332-383, Aug. 2001.
    • ACM Transactions On Computer Systems , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.S.2    Wolf, A.L.3
  • 3
    • 35248900875 scopus 로고    scopus 로고
    • Congestion Control in a Reliable Scalable Message-Oriented Middleware
    • M. Endler and D. Schmidt, Eds. Rio de Janeiro, Brazil: Springer, June 2003
    • th Int. Conf. on Middleware (Middleware '03), M. Endler and D. Schmidt, Eds. Rio de Janeiro, Brazil: Springer, June 2003, pp. 202-221.
    • th Int. Conf. On Middleware (Middleware '03) , pp. 202-221
    • Pietzuch, P.R.1    Bhola, S.2
  • 12
    • 33646794983 scopus 로고    scopus 로고
    • Securing publish/subscribe for multi-domain systems
    • ser. Lecture Notes in Computer Science, G. Alonso, Ed, Springer
    • J. Bacon, D. M. Eyers, K. Moody, and L. I. W. Pesonen, "Securing publish/subscribe for multi-domain systems," in Middleware, ser. Lecture Notes in Computer Science, G. Alonso, Ed., vol. 3790. Springer, 2005, pp. 1-20.
    • (2005) Middleware , vol.3790 , pp. 1-20
    • Bacon, J.1    Eyers, D.M.2    Moody, K.3    Pesonen, L.I.W.4
  • 13
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 15
    • 4143121153 scopus 로고    scopus 로고
    • Access control and trust in the use of widely distributed services
    • Springer-Verlag, Nov
    • J. Bacon, K. Moody, and W. Yao, "Access control and trust in the use of widely distributed services," in Middleware 2001, vol. LNCS 2218. Springer-Verlag, Nov. 2001, pp. 300-315.
    • (2001) Middleware 2001 , vol.LNCS 2218 , pp. 300-315
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 16
    • 84865788031 scopus 로고    scopus 로고
    • A Model of OASIS Role-Based Access Control and its Support for Active Security
    • Nov. 2002
    • J. Bacon, K. Moody, and W. Yao, "A Model of OASIS Role-Based Access Control and its Support for Active Security," ACM Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 492-540, Nov. 2002.
    • ACM Transactions On Information and System Security (TISSEC) , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.