-
1
-
-
0033897228
-
Generic support for distributed applications
-
DOI 10.1109/2.825698
-
Bacon, J., Moody, K., Bates, J., Hayton, R., Ma, C., McNeil, A., Seidel, O., Spiteri, M.: Generic support for distributed applications. IEEE Computer 33(3), 68-76 (2000) (Pubitemid 30574033)
-
(2000)
Computer
, vol.33
, Issue.3
, pp. 68-76
-
-
Bacon, J.1
Moody, K.2
Bates, J.3
Hayton, R.4
Ma, C.5
McNeil, A.6
Seidel, O.7
Spiteri, M.8
-
2
-
-
0032659626
-
An efficient multicast protocol for content-based publish-subscribe systems
-
IEEE Computer Society Press, Los Alamitos
-
Banavar, G., Chandra, T., Mukherjee, B., Nagarajarao, J., Strom, R., Sturman, D.: An efficient multicast protocol for content-based publish-subscribe systems. In: International Conference on Distributed Computing Systems, vol. 19, pp. 262-272. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
International Conference on Distributed Computing Systems
, vol.19
, pp. 262-272
-
-
Banavar, G.1
Chandra, T.2
Mukherjee, B.3
Nagarajarao, J.4
Strom, R.5
Sturman, D.6
-
3
-
-
80052994578
-
Multi-recipient encryption schemes: Security notions and randomness re-use
-
Desmedt, Y.G. (ed.) LNCS Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Staddon, J.: Multi-recipient encryption schemes: Security notions and randomness re-use. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567. Springer, Heidelberg (2002)
-
(2002)
PKC 2003
, vol.2567
-
-
Bellare, M.1
Boldyreva, A.2
Staddon, J.3
-
4
-
-
34548731375
-
Ciphertext-policy attribute-based en-cryption
-
(Citeseer)
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based en- cryption. In: IEEE Symposium on Security and Privacy, pp. 321-334 (2007) (Citeseer)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
DOI 10.1145/380749.380767
-
Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Design and evaluation of a wide- area event notification service. ACM Transactions on Computer Systems (TOCS) 19(3), 332-383 (2001) (Pubitemid 33619857)
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
7
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Atluri, V. (ed.) LNCS Springer, Heidelberg
-
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 127-143. Springer, Heidelberg (2008)
-
(2008)
DAS 2008
, vol.5094
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
8
-
-
0345565888
-
The many faces of publish/subscribe
-
Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Computing Surveys (CSUR) 35(2), 131 (2003)
-
(2003)
ACM Computing Surveys (CSUR)
, vol.35
, Issue.2
, pp. 131
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.M.4
-
9
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) LNCS Springer, Heidelberg
-
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
-
(2004)
ACNS 2004
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
10
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
ACM, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, p. 98. ACM, New York (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
11
-
-
0344044989
-
-
Sun Microsystems Inc., Santa Clara
-
Burridge, R., Sharma, R., Fialli, J., Hapner, M., Stout, K.: Java message service. Sun Microsystems Inc., Santa Clara (2002)
-
(2002)
Java Message Service
-
-
Burridge, R.1
Sharma, R.2
Fialli, J.3
Hapner, M.4
Stout, K.5
-
12
-
-
33644536683
-
Scalable security and accounting services for content-based publish/subscribe systems
-
ACM, New York
-
Khurana, H.: Scalable security and accounting services for content-based publish/subscribe systems. In: Proceedings of the 2005 ACM symposium on Applied computing, p. 807. ACM, New York (2005)
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing
, pp. 807
-
-
Khurana, H.1
-
13
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM, New York
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non- monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and communications security, p. 203. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
14
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
Raiciu, C., Rosenblum, D.S.: Enabling confidentiality in content-based publish/subscribe infrastructures. In: Securecomm and Workshops. vol. 28, pp. 1-11 (2006)
-
(2006)
Securecomm and Workshops
, vol.28
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
15
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
SEC 2009, Pafos, Cyprus, May 18-20 Springer, Heidelberg
-
Shikfa, A., Onen, M., Molva, R.: Privacy-Preserving Content-Based Publish/Subscribe Networks. In: Proceedings of Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, p. 270. Springer, Heidelberg (2009)
-
(2009)
Proceedings of Emerging Challenges for Security, Privacy and Trust: 24Th Ifip Tc 11 International Information Security Conference
, pp. 270
-
-
Shikfa, A.1
Onen, M.2
Molva, R.3
-
18
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
SP 2000
-
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, SP 2000, pp. 44-55 (2000)
-
(2000)
Proceedings of 2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
20
-
-
0034819333
-
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
-
ACM, New York
-
Zhuang, S.Q., Zhao, B.Y., Joseph, A.D., Katz, R.H., Kubiatowicz, J.D.: Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination. In: Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video, p. 20. ACM, New York (2001)
-
(2001)
Proceedings of the 11th International Workshop on Network and Operating Systems Support for Digital Audio and Video
, pp. 20
-
-
Zhuang, S.Q.1
Zhao, B.Y.2
Joseph, A.D.3
Katz, R.H.4
Kubiatowicz, J.D.5
|