-
1
-
-
0033897228
-
Generic support for distributed applications
-
Bacon, J., Moody, K., Bates, J., Hayton, R., Ma, C., McNeil, A., Seidel, O., and Spiteri, M. (2000). Generic support for distributed applications. IEEE Computer, 33(3): 68-76.
-
(2000)
IEEE Computer
, vol.33
, Issue.3
, pp. 68-76
-
-
Bacon, J.1
Moody, K.2
Bates, J.3
Hayton, R.4
Ma, C.5
McNeil, A.6
Seidel, O.7
Spiteri, M.8
-
2
-
-
0032659626
-
An efficient multicast protocol for content-based publish-subscribe systems
-
IEEE COMPUTER SOCIETY PRESS
-
Banavar, G., Chandra, T., Mukherjee, B., Nagarajarao, J., Strom, R., and Sturman, D. (1999). An efficient multicast protocol for content-based publish-subscribe systems. In International Conference on Distributed Computing Systems, volume 19, pages 262-272. IEEE COMPUTER SOCIETY PRESS.
-
(1999)
International Conference on Distributed Computing Systems
, vol.19
, pp. 262-272
-
-
Banavar, G.1
Chandra, T.2
Mukherjee, B.3
Nagarajarao, J.4
Strom, R.5
Sturman, D.6
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Citeseer
-
Bethencourt, J., Sahai, A., and Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321-334. Citeseer.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
DOI 10.1145/380749.380767
-
Carzaniga, A., Rosenblum, D., and Wolf, A. (2001). Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems (TOCS), 19(3): 332-383. (Pubitemid 33619857)
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
5
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Dong, C., Russello, G., and Dulay, N. (2008). Shared and Searchable Encrypted Data for Untrusted Servers. Lecture Notes in Computer Science, 5094: 127-143.
-
(2008)
Lecture Notes in Computer Science
, vol.5094
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
6
-
-
0345565888
-
The many faces of publish/subscribe
-
Eugster, P., Felber, P., Guerraoui, R., and Kermarrec, A. (2003). The many faces of publish/subscribe. ACM Computing Surveys (CSUR), 35(2): 131.
-
(2003)
ACM Computing Surveys (CSUR)
, vol.35
, Issue.2
, pp. 131
-
-
Eugster, P.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.4
-
7
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, page 98. ACM.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
0344044989
-
-
Sun Microsystems Inc., Santa Clara, CA
-
Hapner, M., B. R. S. R. F. J. and Stout, K. (2002). Java message service. Sun Microsystems Inc., Santa Clara, CA.
-
(2002)
Java Message Service
-
-
Hapner, M.1
B, R.S.R.F.J.2
Stout, K.3
-
9
-
-
33644536683
-
Scalable security and accounting services for content-based publish/subscribe systems
-
ACM
-
Khurana, H. (2005). Scalable security and accounting services for content-based publish/subscribe systems. In Proceedings of the 2005 ACM symposium on Applied computing, page 807. ACM.
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing
, pp. 807
-
-
Khurana, H.1
-
10
-
-
74049120601
-
Attributebased encryption with non-monotonic access structures
-
ACM
-
Ostrovsky, R., Sahai, A., and Waters, B. (2007). Attributebased encryption with non-monotonic access structures. In Proceedings of the 14th ACM conference on Computer and communications security, page 203. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
11
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
Raiciu, C. and Rosenblum, D. (2006). Enabling confidentiality in content-based publish/subscribe infrastructures. Securecomm and Workshops, 28: 1-11.
-
(2006)
Securecomm and Workshops
, vol.28
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.2
-
12
-
-
84885059952
-
Privacypreserving content-based publish/subscribe networks
-
Springer
-
Shikfa, A., Onen, M., and Molva, R. (2009). PrivacyPreserving Content-Based Publish/Subscribe Networks. In Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings, page 270. Springer.
-
(2009)
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings
, pp. 270
-
-
Shikfa, A.1
Onen, M.2
Molva, R.3
-
15
-
-
84929315070
-
Security issues and requirements for Internet-scale publish-subscribe systems
-
Wang, C., Carzaniga, A., Evans, D., and Wolf, A. (2002). Security issues and requirements for Internet-scale publish-subscribe systems. In PROCEEDINGS OF THE ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, pages 303-303.
-
(2002)
Proceedings of the Annual Hawaii International Conference on System Sciences
, pp. 303-303
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.4
-
16
-
-
0034819333
-
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
-
ACM
-
Zhuang, S., Zhao, B., Joseph, A., Katz, R., and Kubiatowicz, J. (2001). Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination. In Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video, page 20. ACM.
-
(2001)
Proceedings of the 11th International Workshop on Network and Operating Systems Support for Digital Audio and Video
, pp. 20
-
-
Zhuang, S.1
Zhao, B.2
Joseph, A.3
Katz, R.4
Kubiatowicz, J.5
|