-
1
-
-
0345565888
-
The many faces of publish/subscribe
-
Jun
-
P. Eugster, P. Felber, R. Guerraoui, and A.-M. Kermarrec, "The many faces of publish/subscribe, " ACM Comput. Surveys, vol. 35, no. 2, pp. 114-131, Jun. 2003.
-
(2003)
ACM Comput. Surveys
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
2
-
-
84883170089
-
An event-based notification approach for the delivery of patient medical information
-
Jan.
-
C. Esposito, M. Ciampi, and G. De Pietro, "An event-based notification approach for the delivery of patient medical information, " Inf. Syst., vol. 39, pp. 22-44, Jan. 2014.
-
(2014)
Inf. Syst.
, vol.39
, pp. 22-44
-
-
Esposito, C.1
Ciampi, M.2
De Pietro, G.3
-
3
-
-
84858153176
-
On data dissemination for large-scale complex critical infrastructures
-
Mar.
-
M. Cinque, C. Di Martino, and C. Esposito, "On data dissemination for large-scale complex critical infrastructures, " Comput. Netw., vol. 56, no. 4, pp. 1215-1235, Mar. 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.4
, pp. 1215-1235
-
-
Cinque, M.1
Di Martino, C.2
Esposito, C.3
-
4
-
-
33751524316
-
Service-oriented architecture for distributed publish/subscribe middleware in electronics production
-
Nov
-
I. Delamer and J. Lastra, "Service-oriented architecture for distributed publish/subscribe middleware in electronics production, " IEEE Trans. Ind. Informat., vol. 2, no. 4, pp. 281-294, Nov. 2006.
-
(2006)
IEEE Trans. Ind. Informat.
, vol.2
, Issue.4
, pp. 281-294
-
-
Delamer, I.1
Lastra, J.2
-
5
-
-
84929589225
-
-
Data Distribution Service (DDS) for Real-Time Systems OMG Needham MA USA, Accessed: Sep. 2012. [Online]
-
Data Distribution Service (DDS) for Real-Time Systems, OMG, Needham, MA, USA, 2007, Accessed: Sep. 2012. [Online]. Available: www.omg.org
-
(2007)
-
-
-
6
-
-
84929589226
-
-
Java Message Service, Sun Microsystems, Santa Clara, CA, USA, Accessed: Sep. 2012. [Online]
-
Java Message Service, Sun Microsystems, Santa Clara, CA, USA, 2002, Accessed: Sep. 2012. [Online]. Available: docs.sun.com/app/docs/doc/816-5904-10
-
(2002)
-
-
-
7
-
-
84929589227
-
-
FuseSource, FuseSource Customers, Accessed: Jul.
-
FuseSource, FuseSource Customers, Accessed: Jul. 2013. [Online]. Available: http://www.w3.org/TR/xmldsig-core
-
(2013)
-
-
-
8
-
-
84929589228
-
-
Real-Time Innovations (RTI), Industries Sunnyvale, CA USA, Accessed: Apr.
-
Real-Time Innovations (RTI), Industries, Sunnyvale, CA, USA, Accessed: Apr. 2013. [Online]. Available: http://www.rti.com/industries/customers.html
-
(2013)
-
-
-
9
-
-
84929589229
-
-
PrismTech Ltd., Industry Solutions Tyne and Wear U.K. Accessed: Apr.
-
PrismTech Ltd., Industry Solutions, Tyne and Wear, U.K., Accessed: Apr. 2013. [Online]. Available: http://www.prismtech.com/opensplice/industry-solutions
-
(2013)
-
-
-
10
-
-
84875726669
-
On reliability in publish/subscribe services
-
Apr
-
C. Esposito, D. Cotroneo, and S. Russo, "On reliability in publish/subscribe services, " Comput. Netw., vol. 57, no. 5, pp. 1318-1343, Apr. 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.5
, pp. 1318-1343
-
-
Esposito, C.1
Cotroneo, D.2
Russo, S.3
-
13
-
-
84929589230
-
-
CORBA Event Service Specification, OMG Needham, MA USA, Accessed: May 2011
-
CORBA Event Service Specification, OMG, Needham, MA, USA, 2001, Accessed: May 2011. [Online]. Available: www.omg.org/
-
(2001)
-
-
-
14
-
-
84929589231
-
-
Web Services Notification (WSN), OASIS Burlington, MA, USA, Accessed: Sep. 2012
-
Web Services Notification (WSN), OASIS, Burlington, MA, USA, 2006, Accessed: Sep. 2012. [Online]. Available: www.oasis-open.org/
-
(2006)
-
-
-
16
-
-
0004189634
-
-
Reading, MA, USA: Addison-Wesley
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns. Reading, MA, USA: Addison-Wesley, 1995.
-
(1995)
Design Patterns
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
17
-
-
0030407910
-
The event notification pattern-Integrating implicit invocation with object-orientation
-
D. Riehle, "The event notification pattern-Integrating implicit invocation with object-orientation, " Theor. Pract. Obj. Syst., vol. 2, no. 1, pp. 43-52, 1996.
-
(1996)
Theor. Pract. Obj. Syst.
, vol.2
, Issue.1
, pp. 43-52
-
-
Riehle, D.1
-
18
-
-
84976813340
-
Formalizing design spaces: Implicit invocation mechanisms
-
Lecture Notes in Computer Science
-
D. Garlan and D. Notkin, "Formalizing design spaces: Implicit invocation mechanisms, " in Proc. 4th Int. Symp. VDM Europe Formal Softw. Develop., vol. 551, Volume I, Lecture Notes in Computer Science, 1991, pp. 31-44.
-
(1991)
Proc. 4th Int. Symp. VDM Europe Formal Softw. Develop.
, vol.551
, pp. 31-44
-
-
Garlan, D.1
Notkin, D.2
-
19
-
-
0004101997
-
-
Hoboken, NJ, USA:Wiley
-
D. Schmidt, M. Stal, H. Rohnert, and F. Buschmann, Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects. Hoboken, NJ, USA: Wiley, 2000.
-
(2000)
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects
-
-
Schmidt, D.1
Stal, M.2
Rohnert, H.3
Buschmann, F.4
-
20
-
-
0004101993
-
-
Hoboken, NJ, USA: Wiley
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented SoftwareArchitecture:ASystem ofPatterns. Hoboken, NJ, USA: Wiley, 1996.
-
(1996)
Pattern-Oriented Software Architecture: A System of Patterns
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
21
-
-
50049112346
-
-
Hoboken, NJ, USA: Wiley
-
F. Buschmann, K. Henney, and D. Schmidt, Pattern-Oriented Software Architecture: A Pattern Language for Distributed Computing. Hoboken, NJ, USA: Wiley, 2007.
-
(2007)
Pattern-Oriented Software Architecture: A Pattern Language for Distributed Computing
-
-
Buschmann, F.1
Henney, K.2
Schmidt, D.3
-
24
-
-
0027809735
-
The information bus: An architecture for extensible distributed systems
-
Dec
-
B. Oki, M. Pfluegl, A. Siegel, and D. Skeen, "The information bus: An architecture for extensible distributed systems, " ACM SIGOPS Oper. Syst. Rev., vol. 27, no. 5, pp. 58-68, Dec. 1993.
-
(1993)
ACM SIGOPS Oper. Syst. Rev.
, vol.27
, Issue.5
, pp. 58-68
-
-
Oki, B.1
Pfluegl, M.2
Siegel, A.3
Skeen, D.4
-
25
-
-
33846609442
-
Type-based publish/subscribe: Concepts and experiences
-
Jan
-
P. Eugster, "Type-based publish/subscribe: Concepts and experiences, " ACM Trans. Programm. Lang. Syst., vol. 29, no. 1, pp. 1-50, Jan. 2007.
-
(2007)
ACM Trans. Programm. Lang. Syst.
, vol.29
, Issue.1
, pp. 1-50
-
-
Eugster, P.1
-
26
-
-
0012179838
-
A design framework for internet-scale event observation and notification
-
Nov
-
D. Rosenblum and A.Wolf, "A design framework for internet-scale event observation and notification, " ACM SIGSOFT Softw. Eng. Notes, vol. 22, no. 6, pp. 344-360, Nov. 1997.
-
(1997)
ACM SIGSOFT Softw. Eng. Notes
, vol.22
, Issue.6
, pp. 344-360
-
-
Rosenblum, D.1
Wolf, A.2
-
27
-
-
84864276279
-
Distributed event routing in publish/subscribe systems
-
Berlin, Germany: Springer-Verlag
-
R. Baldoni, L. Querzoni, S. Tarkoma, and A. Virgillito, "Distributed event routing in publish/subscribe systems, " in Middleware for Network Eccentric and Mobile Applications. Berlin, Germany: Springer-Verlag, 2009, pp. 219-244.
-
(2009)
Middleware for Network Eccentric and Mobile Applications
, pp. 219-244
-
-
Baldoni, R.1
Querzoni, L.2
Tarkoma, S.3
Virgillito, A.4
-
28
-
-
80053045941
-
Content-based publish/subscribe networking and information-centric networking
-
Aug.
-
A. Carzaniga, M. Papalini, and A. Wolf, "Content-based publish/subscribe networking and information-centric networking, " in Proc. ACM SIGCOMM Workshop Inf.-Centric Netw., Aug. 2011, pp. 56-61.
-
(2011)
Proc. ACM SIGCOMM Workshop Inf.-Centric Netw.
, pp. 56-61
-
-
Carzaniga, A.1
Papalini, M.2
Wolf, A.3
-
29
-
-
77249108336
-
Routing algorithms for content-based publish/subscribe systems
-
J. Martins and S. Duarte, "Routing algorithms for content-based publish/subscribe systems, " IEEE Commun. Surveys Tuts., vol. 12, no. 1, pp. 39- 58, 2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, vol.12
, Issue.1
, pp. 39-58
-
-
Martins, J.1
Duarte, S.2
-
30
-
-
0031701073
-
Multicast transport protocols: A survey and taxonomy
-
Jan
-
K. Obraczka, "Multicast transport protocols: A survey and taxonomy, " IEEE Commun. Mag., vol. 36, no. 1, pp. 94-102, Jan. 1998.
-
(1998)
IEEE Commun. Mag.
, vol.36
, Issue.1
, pp. 94-102
-
-
Obraczka, K.1
-
31
-
-
3943050736
-
A survey of application level multicast techniques
-
Sep
-
C. K. Yeo, B. S. Lee, and M. H. Er, "A survey of application level multicast techniques, " Comput. Commun., vol. 27, no. 15, pp. 1547- 1568, Sep. 2004.
-
(2004)
Comput. Commun.
, vol.27
, Issue.15
, pp. 1547-1568
-
-
Yeo, C.K.1
Lee, B.S.2
Er, M.H.3
-
32
-
-
37849053218
-
A survey of application-layer multicast protocols
-
M. Hosseini, D. Tanvir, S. Shimohammadi , and N. D. Georganas, "A survey of application-layer multicast protocols, " IEEE Commun. Surveys Tuts., vol. 9, no. 3, pp. 58-74, 2007.
-
(2007)
IEEE Commun. Surveys Tuts.
, vol.9
, Issue.3
, pp. 58-74
-
-
Hosseini, M.1
Tanvir, D.2
Shimohammadi, S.3
Georganas, N.D.4
-
33
-
-
0036801441
-
A case for end system multicast
-
Oct
-
Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, "A case for end system multicast, " IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1456-1471, Oct. 2002.
-
(2002)
IEEE J. Sel. Areas Commun.
, vol.20
, Issue.8
, pp. 1456-1471
-
-
Chu, Y.1
Rao, S.G.2
Seshan, S.3
Zhang, H.4
-
34
-
-
0025430666
-
Multicast routing in datagram internetworks and extended LANs
-
May
-
S. Deering and D. Cheriton, "Multicast routing in datagram internetworks and extended LANs, " ACM Trans. Comput. Syst., vol. 8, no. 2, pp. 85-100, May 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.2
, pp. 85-100
-
-
Deering, S.1
Cheriton, D.2
-
35
-
-
0030126833
-
The PIM architecture for wide-area multicast routing
-
Apr
-
S. Deering et al., "The PIM architecture for wide-area multicast routing, " IEEE/ACM Trans. Netw., vol. 4, no. 2, pp. 784-803, Apr. 1997.
-
(1997)
IEEE/ACM Trans. Netw.
, vol.4
, Issue.2
, pp. 784-803
-
-
Deering, S.1
-
36
-
-
78650086305
-
A survey on the design, applications, enhancements of application-layer overlay networks
-
Nov.
-
J. Kurian and K. Sarac, "A survey on the design, applications, enhancements of application-layer overlay networks, " ACM Comput. Surveys, vol. 43, no. 1, pp. 5:1-5:34, Nov. 2010.
-
(2010)
ACM Comput. Surveys
, vol.43
, Issue.1
, pp. 51-534
-
-
Kurian, J.1
Sarac, K.2
-
37
-
-
34447329493
-
Mesh or multiple-tree: A comparative study of live P2P streaming approaches
-
May
-
N. Magharei, R. Rejaie, and Y. Guo, "Mesh or multiple-tree: A comparative study of live P2P streaming approaches, " in Proc. 26th IEEE Int. Conf. Comput. Commun., May 2007, pp. 1424-1432.
-
(2007)
Proc. 26th IEEE Int. Conf. Comput. Commun.
, pp. 1424-1432
-
-
Magharei, N.1
Rejaie, R.2
Guo, Y.3
-
38
-
-
0001776520
-
Group communication specifications: A comprehensive study
-
Dec
-
G. V. Chockler, I. Keidar, and R. Vitenberg, "Group communication specifications: A comprehensive study, " ACM Comput. Surveys, vol. 33, no. 4, pp. 427-469, Dec. 2001.
-
(2001)
ACM Comput. Surveys
, vol.33
, Issue.4
, pp. 427-469
-
-
Chockler, G.V.1
Keidar, I.2
Vitenberg, R.3
-
39
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
Aug
-
A. Carzaniga, D. Rosenblum, and A. Wolf, "Design and evaluation of a wide-area event notification service, " ACMTrans. Comput. Syst., vol. 19, no. 3, pp. 332-383, Aug. 2001.
-
(2001)
ACMTrans. Comput. Syst.
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.2
Wolf, A.3
-
40
-
-
0036802048
-
Scribe: A largescale and decentralized application-level multicast infrastructure
-
Oct
-
M. Castro, P. Drushel, A. Kermarec, and A. Rowstrom, "Scribe: A largescale and decentralized application-level multicast infrastructure, " IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1489-1499, Oct. 2004.
-
(2004)
IEEE J. Sel. Areas Commun.
, vol.20
, Issue.8
, pp. 1489-1499
-
-
Castro, M.1
Drushel, P.2
Kermarec, A.3
Rowstrom, A.4
-
42
-
-
0003851399
-
-
Hoboken, NJ, USA: Wiley
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, Source Code in C, 2nd ed. Hoboken, NJ, USA: Wiley, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, Source Code in C, 2nd Ed
-
-
Schneier, B.1
-
43
-
-
84889056294
-
Minimalt: Minimal-latency networking through better security
-
Accessed: Jul. 2013
-
W. M. Petullo, X. Zhang, J. A. Solworth, D. J. Bernstein, and T. Lange, "Minimalt: Minimal-latency networking through better security, " in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2013, pp. 425- 438, Accessed: Jul. 2013. [Online]. Available: http://eprint.iacr.org/
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 425-438
-
-
Petullo, W.M.1
Zhang, X.2
Solworth, J.A.3
Bernstein, D.J.4
Lange, T.5
-
44
-
-
57849131733
-
A comparative study of the performance and security issues of aes and rsa cryptography
-
Nov
-
A. A. Hasib and A. Haque, "A comparative study of the performance and security issues of aes and rsa cryptography, " in Proc. 3rd Int. Conf. Convergence Hybrid Inf. Technol., Nov. 2008, vol. 2, pp. 505-510.
-
(2008)
Proc. 3rd Int. Conf. Convergence Hybrid Inf. Technol.
, vol.2
, pp. 505-510
-
-
Hasib, A.A.1
Haque, A.2
-
45
-
-
0021409284
-
Probabilistic encryption
-
Apr
-
S. Goldwasser and S. Micali, "Probabilistic encryption, " J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, Apr. 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
46
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. 17th Int. Conf. Theory Appl. Cryptogr. Tech., 1999, pp. 223-238.
-
(1999)
Proc. 17th Int. Conf. Theory Appl. Cryptogr. Tech
, pp. 223-238
-
-
Paillier, P.1
-
47
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
Jan
-
C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists, " EURASIP J. Inf. Security, vol. 2007, no. 1, pp. 013801:1-013801:15, Jan. 2007.
-
(2007)
EURASIP J. Inf. Security
, vol.2007
, Issue.1
, pp. 0138011-01380115
-
-
Fontaine, C.1
Galand, F.2
-
48
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Berlin, Germany: Springer-Verlag
-
A. Shamir, "Identity-based cryptosystems and signature schemes, " in Advances in Cryptology, Lecture Notes in Computer Science, vol. 196. Berlin, Germany: Springer-Verlag, 1985, pp. 47-53.
-
(1985)
Advances in Cryptology, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
49
-
-
84937428623
-
Efficient algorithms for pairingbased cryptosystems
-
Lecture Notes in Computer Science
-
P. Barreto, H.Kim, B.Lynn, andM. Scott, "Efficient algorithms for pairingbased cryptosystems, " in Proc. 22ndAnnu. Int.Cryptol.Conf.Adv.Cryptol., vol. 2442, Lecture Notes in Computer Science, 2002, pp. 354-369.
-
(2002)
Proc. 22ndAnnu. Int.Cryptol.Conf.Adv.Cryptol.
, vol.2442
, pp. 354-369
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
50
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Lecture Notes in Computer Science
-
F. Zhang, R. Safavi-Naini, andW. Susilo, "An efficient signature scheme from bilinear pairings and its applications, " in Proc. PKC, vol. 2947, Lecture Notes in Computer Science, 2004, pp. 277-290.
-
(2004)
Proc. PKC
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
51
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
52
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data, " in Proc. IEEE Symp. Security Privacy, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
53
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
May/Jun
-
C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. 41st ACM Symp. Theory Comput., May/Jun. 2009, pp. 169-178.
-
(2009)
Proc. 41st ACM Symp. Theory Comput.
, pp. 169-178
-
-
Gentry, C.1
-
54
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
C. Dong, G. Russello, and N. Dulay, "Shared and searchable encrypted data for untrusted servers, " in Proc. 22nd Annu. IFIP WG 11.3 Work. Conf. Data Appl. Security, 2008, pp. 127-143.
-
(2008)
Proc. 22nd Annu. IFIP WG 11.3 Work. Conf. Data Appl. Security
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
55
-
-
84929580736
-
Understanding digital certificates
-
London, U.K. Sep
-
M. O'Brien and G. Weir, "Understanding digital certificates, " in Proc. 2nd Int. Conf. Cybercrime Forensics Educ. Training, London, U.K., Sep. 2008, pp. 1-9.
-
(2008)
Proc. 2nd Int. Conf. Cybercrime Forensics Educ. Training
, pp. 1-9
-
-
O'Brien, M.1
Weir, G.2
-
57
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
58
-
-
85024261619
-
Signature schemes based on the strong RSA assumption
-
Aug
-
R. Cramer and V. Shoup, "Signature schemes based on the strong RSA assumption, " ACM Trans. Inf. Syst. Security, vol. 3, no. 3, pp. 161-185, Aug. 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
59
-
-
0000534667
-
Apublic key cryptosystem and a signature scheme based on discrete logarithms
-
T. E. Gamal, "Apublic key cryptosystem and a signature scheme based on discrete logarithms, " in Proc.CRYPTO84Adv.Cryptol., 1985, pp. 10-18.
-
(1985)
Proc.CRYPTO84Adv.Cryptol
, pp. 10-18
-
-
Gamal, T.E.1
-
61
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
M. J. Wiener, "Performance comparison of public-key cryptosystems, " RSA Crypto Bytes, vol. 4, no. 1, pp. 1-5, 1998.
-
(1998)
RSA Crypto Bytes
, vol.4
, Issue.1
, pp. 1-5
-
-
Wiener, M.J.1
-
62
-
-
0001263548
-
A certified digital signature
-
R. Merkle, "A certified digital signature, " in Proc. Adv. Cryptol., 1989, pp. 218-238.
-
(1989)
Proc. Adv. Cryptol
, pp. 218-238
-
-
Merkle, R.1
-
63
-
-
52949130277
-
Fast hash-based signatures on constrained devices
-
Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
-
S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, and C. Paar, "Fast hash-based signatures on constrained devices, " in Smart Card Research and Advanced Applications, vol. 5189, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2008, pp. 104-117.
-
(2008)
Smart Card Research and Advanced Applications
, vol.5189
, pp. 104-117
-
-
Rohde, S.1
Eisenbarth, T.2
Dahmen, E.3
Buchmann, J.4
Paar, C.5
-
64
-
-
33646059204
-
Sanitizable signatures
-
Lecture Notes in Computer Science
-
G. Ateniese, D. Chou, B. de Medeiros, and G. Tsudik, "Sanitizable signatures, " in Proc. Eur. Symp. Res. Comput. Security, vol. 3679, Lecture Notes in Computer Science, 2005, pp. 159-177.
-
(2005)
Proc. Eur. Symp. Res. Comput. Security
, vol.3679
, pp. 159-177
-
-
Ateniese, G.1
Chou, D.2
De Medeiros, B.3
Tsudik, G.4
-
66
-
-
84929589232
-
-
Tokyo Inst. Technol., Tokyo, Japan, Accessed: Jul.
-
M. Suzuki, T. Isshiki, and K. Tanaka, Sanitizable signature with secret information, Tokyo Inst. Technol., Tokyo, Japan, Accessed: Jul. 2014.
-
(2014)
Sanitizable Signature with Secret Information
-
-
Suzuki, M.1
Isshiki, T.2
Tanaka, K.3
-
67
-
-
84929589233
-
-
[Online]. Available: http://www.is.titech.ac.jp/research/research-report/C/C-215.pdf
-
-
-
-
68
-
-
84929589234
-
Digital signature schemes for computer communication networks
-
Oct
-
H. Meijer and S. Akl, "Digital signature schemes for computer communication networks, " ACM SIGCOMM Comput. Commun. Rev., vol. 11, no. 4, pp. 37-41, Oct. 1981.
-
(1981)
ACM SIGCOMM Comput. Commun. Rev.
, vol.11
, Issue.4
, pp. 37-41
-
-
Meijer, H.1
Akl, S.2
-
69
-
-
79959547649
-
-
MIT, Cambridge, MA, USA, Accessed: Jul. 2014
-
M. van Dijk, L. F. G. Sarmenta, C.W. O'Donnell, and S. Devadas, "Proof of freshness: How to efficiently use an online single secure clock to secure shared untrusted memory, " MIT, Cambridge, MA, USA, 2006, Accessed: Jul. 2014. [Online]. Available: http://csg.csail.mit.edu/pubs/memos/Memo-496/memo496.pdf
-
(2006)
Proof of Freshness: How to Efficiently Use An Online Single Secure Clock to Secure Shared Untrusted Memory
-
-
Van Dijk, M.1
Sarmenta, L.F.G.2
O'Donnell, C.W.3
Devadas, S.4
-
70
-
-
0023400323
-
Clock synchronization in distributed real-time systems
-
Aug
-
H. Kopetz and W. Ochsenreiter, "Clock synchronization in distributed real-time systems, " IEEE Trans. Comput., vol. C-36, no. 8, pp. 933-940, Aug. 1987.
-
(1987)
IEEE Trans. Comput.
, vol.C-36
, Issue.8
, pp. 933-940
-
-
Kopetz, H.1
Ochsenreiter, W.2
-
71
-
-
77950627282
-
Coupling-based internal clock synchronization for large-scale dynamic distributed systems
-
May
-
R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, and S. Piergiovanni, "Coupling-based internal clock synchronization for large-scale dynamic distributed systems, " IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 5, pp. 607-619, May 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.5
, pp. 607-619
-
-
Baldoni, R.1
Corsaro, A.2
Querzoni, L.3
Scipioni, S.4
Piergiovanni, S.5
-
72
-
-
0036836682
-
An intensive survey of fair nonrepudiation protocols
-
Nov
-
S. Kremer, O.Markowitch, and J. Zhou, "An intensive survey of fair nonrepudiation protocols, " Comput. Commun., vol. 25, no. 17, pp. 1606- 1621, Nov. 2002.
-
(2002)
Comput. Commun.
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
73
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Jan
-
M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts, " IEICE Trans. Fundam. Electron., Commun. Comput. Sci., vol. 80, no. 1, pp. 54-63, Jan. 1997.
-
(1997)
IEICE Trans. Fundam. Electron., Commun. Comput. Sci.
, vol.80
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
74
-
-
84956869808
-
On quorum controlled asymmetric proxy re-encryption
-
Lecture Notes in Computer Science
-
M. Jakobsson, "On quorum controlled asymmetric proxy re-encryption, " in Proc. 2nd Int. Workshop Pract. Theory Public Key Cryptogr., vol. 1560, Lecture Notes in Computer Science, 1999, pp. 112-121.
-
(1999)
Proc. 2nd Int. Workshop Pract. Theory Public Key Cryptogr.
, vol.1560
, pp. 112-121
-
-
Jakobsson, M.1
-
75
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
77
-
-
84877578836
-
A survey on identity management for the future network
-
J. Torres, M. Nogueira, and G. Pujolle, "A survey on identity management for the future network, " IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 787-802, 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.2
, pp. 787-802
-
-
Torres, J.1
Nogueira, M.2
Pujolle, G.3
-
78
-
-
8344266879
-
Authentication and Authorization Infrastructures (aais): A comparative survey
-
Oct
-
J. Lopez, R. Oppliger, and G. Pernul, "Authentication and Authorization Infrastructures (aais): A comparative survey, " Comput. Security, vol. 23, no. 7, pp. 578-590, Oct. 2004.
-
(2004)
Comput. Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
83
-
-
0141911037
-
-
Norwood, MA, USA:Artech House, Jan, Print on Demand
-
D. Ferraiolo, D. Kuhn, and R. Chandramouli, Role-Based Access Control, 2nd ed. Norwood, MA, USA: Artech House, Jan. 2007, Print on Demand.
-
(2007)
Role-Based Access Control, 2nd Ed
-
-
Ferraiolo, D.1
Kuhn, D.2
Chandramouli, R.3
-
84
-
-
84892902868
-
A pattern system for access control
-
Jul
-
T. Priebe, E. Fernandez, J. Mehlau, and G. Pernul, "A pattern system for access control, " in Proc. 18th Annu. IFIP WG 11.3 Work. Conf. Data Appl. Security, Jul. 2004, pp. 235-249.
-
(2004)
Proc. 18th Annu. IFIP WG 11.3 Work. Conf. Data Appl. Security
, pp. 235-249
-
-
Priebe, T.1
Fernandez, E.2
Mehlau, J.3
Pernul, G.4
-
85
-
-
67650434970
-
Research on policybased access control model
-
L. Zhi, W. Jing, C. Xiao-su, and J. Lian-Xing, "Research on policybased access control model, " in Proc. Int. Conf. Netw. Security, Wireless Commun. Trusted Comput., 2009, vol. 2, pp. 164-167.
-
(2009)
Proc. Int. Conf. Netw. Security, Wireless Commun. Trusted Comput
, vol.2
, pp. 164-167
-
-
Zhi, L.1
Jing, W.2
Xiao-Su, C.3
Lian-Xing, J.4
-
87
-
-
78649923058
-
A formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints
-
S. Bistarelli, F. Martinelli, and F. Santini, "A formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints, " in Proc. 7th Int. Conf. Auton. Trusted Comput., 2010, pp. 268-282.
-
(2010)
Proc. 7th Int. Conf. Auton. Trusted Comput.
, pp. 268-282
-
-
Bistarelli, S.1
Martinelli, F.2
Santini, F.3
-
88
-
-
84929589235
-
-
Integrating the Healthcare Enterprise (IHE), Access Control, Accessed: Jul. 2013
-
Integrating the Healthcare Enterprise (IHE), Access Control, Accessed: Jul. 2013. [Online]. Available: http://www.ihe.net/Technical-Framework/upload/IHE-ITI-TF-WhitePaper-AccessControl-2009-09-28.pdf
-
-
-
-
90
-
-
3042632320
-
Epidemic information dissemination in distributed systems
-
May
-
P. T. Eugster, R. Guerraoui, A.-M. Kermarrec, and L. Massoulié, "Epidemic information dissemination in distributed systems, " IEEE Comput., vol. 37, no. 5, pp. 60-67, May 2004.
-
(2004)
IEEE Comput.
, vol.37
, Issue.5
, pp. 60-67
-
-
Eugster, P.T.1
Guerraoui, R.2
Kermarrec, A.-M.3
Massoulié, L.4
-
91
-
-
2442542456
-
Epidemic algorithms for reliable content-based publish-subscribe: An evaluation
-
Mar
-
P. Costa, M. Migliavacca, G. Picco, and G. Cugola, "Epidemic algorithms for reliable content-based publish-subscribe: An evaluation, " in Proc. 24th IEEE Int. Conf. Distrib. Comput. Syst., Mar. 2004, pp. 552-561.
-
(2004)
Proc. 24th IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 552-561
-
-
Costa, P.1
Migliavacca, M.2
Picco, G.3
Cugola, G.4
-
93
-
-
84929589236
-
-
Glossary of Key Information Security Terms, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Apr. 2006
-
Glossary of Key Information Security Terms, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Apr. 2006. [Online]. Available: http://csrc.nist.gov/publications/
-
-
-
-
94
-
-
84929581490
-
-
Fort Meade, MD, USA, Apr.
-
National Information Assurance Glossary, Committee on National Security Systems, Fort Meade, MD, USA, Apr. 2010. [Online]. Available: http://www.cnss.gov/Assets/pdf/cnssi-4009.pdf
-
(2010)
Committee on National Security Systems
-
-
-
97
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Jan.-Mar
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing, " IEEE Trans. Dependable Secure Comput., vol. 1, no. 1, pp. 11-33, Jan.-Mar. 2004.
-
(2004)
IEEE Trans. Dependable Secure Comput.
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
98
-
-
84976699318
-
The byzantine generals problem
-
Jul
-
L. Lamport, R. Shostak, and M. Pease, "The byzantine generals problem, " ACM Trans. Programm. Lang. Syst., vol. 4, no. 3, pp. 382-401, Jul. 1982.
-
(1982)
ACM Trans. Programm. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
99
-
-
84874316113
-
Byzantine fault-tolerant publish/subscribe: A cloud computing infrastructure
-
C. Tiancheng and H. Meling, "Byzantine fault-tolerant publish/subscribe: A cloud computing infrastructure, " in Proc. 31st IEEE Symp. Rel. Distrib. Syst., 2012, pp. 454-456.
-
Proc. 31st IEEE Symp. Rel. Distrib. Syst.
, vol.2012
, pp. 454-456
-
-
Tiancheng, C.1
Meling, H.2
-
100
-
-
33749404596
-
Thema: Byzantine-fault-tolerant middleware for web-service applications
-
M. Merideth et al., "Thema: Byzantine-fault-tolerant middleware for web-service applications, " in Proc. 24th IEEE Symp. Rel. Distrib. Syst., 2005, pp. 131-140.
-
(2005)
Proc. 24th IEEE Symp. Rel. Distrib. Syst
, pp. 131-140
-
-
Merideth, M.1
-
101
-
-
84929315070
-
Security issues and requirements for internet-scale publish-subscribe systems
-
Jan
-
C. Wang, A. Carzaniga, D. Evans, and A. Wolf, "Security issues and requirements for internet-scale publish-subscribe systems, " in Proc. 35th Annu. Hawaii Int. Conf. Syst. Sci., Jan. 2002, vol. 9, pp. 7-10.
-
(2002)
Proc. 35th Annu. Hawaii Int. Conf. Syst. Sci.
, vol.9
, pp. 7-10
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.4
-
102
-
-
0348216661
-
Facets of security
-
Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
-
D. Gollmann, "Facets of security, " in Global Computing. Programming Environments, Languages, Security, Analysis of Systems, vol. 2874, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2003, pp. 192-202.
-
(2003)
Global Computing. Programming Environments, Languages, Security, Analysis of Systems
, vol.2874
, pp. 192-202
-
-
Gollmann, D.1
-
103
-
-
0000921140
-
Evidence and non-repudiation
-
Jul
-
J. Zhou and D. Gollmann, "Evidence and non-repudiation, " J. Netw. Comput. Appl., vol. 20, no. 3, pp. 267-281, Jul. 1997.
-
(1997)
J. Netw. Comput. Appl.
, vol.20
, Issue.3
, pp. 267-281
-
-
Zhou, J.1
Gollmann, D.2
-
104
-
-
85008244429
-
Freshness assurance of authentication protocols
-
Lecture Notes in Computer Science
-
K.-Y. Lam and D. Gollmann, "Freshness assurance of authentication protocols, " in Proc. Comput. Security-ESORICS, vol. 648, Lecture Notes in Computer Science, 1992, pp. 261-271.
-
(1992)
Proc. Comput. Security-ESORICS
, vol.648
, pp. 261-271
-
-
Lam, K.-Y.1
Gollmann, D.2
-
105
-
-
0010600006
-
On the validity of digital signatures
-
Apr
-
J. Zhou and R. Deng, "On the validity of digital signatures, " ACM SIGCOMM Comput. Commun. Rev., vol. 30, no. 2, pp. 29-34, Apr. 2000.
-
(2000)
ACM SIGCOMM Comput. Commun. Rev.
, vol.30
, Issue.2
, pp. 29-34
-
-
Zhou, J.1
Deng, R.2
-
106
-
-
0345092813
-
Legal recognition of digital signatures
-
Jul
-
L. Hollaar and A. Asay, "Legal recognition of digital signatures, " IEEE Micro, vol. 16, no. 3, pp. 44-45, Jul. 1996.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 44-45
-
-
Hollaar, L.1
Asay, A.2
-
107
-
-
0003007594
-
Pastry: Scalable, decentralized object localization and routing for large-scale peer-to-peer systems
-
Lecture Notes in Computer Science, Nov
-
A. Rowstrom and P. Drushel, "Pastry: Scalable, decentralized object localization and routing for large-scale peer-to-peer systems, " in Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms, vol. 2218, Lecture Notes in Computer Science, Nov. 2001, pp. 329-351.
-
(2001)
Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms
, vol.2218
, pp. 329-351
-
-
Rowstrom, A.1
Drushel, P.2
-
108
-
-
0036800721
-
Scalable secure group communication over ip multicast
-
Oct
-
S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over ip multicast, " IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1511-1527, Oct. 2002.
-
(2002)
IEEE J. Sel. Areas Commun.
, vol.20
, Issue.8
, pp. 1511-1527
-
-
Banerjee, S.1
Bhattacharjee, B.2
-
109
-
-
0030836908
-
Toward a more secure internet
-
Jan
-
R. Atkinson, "Toward a more secure internet, " IEEE Comput., vol. 30, no. 1, pp. 57-61, Jan. 1997.
-
(1997)
IEEE Comput.
, vol.30
, Issue.1
, pp. 57-61
-
-
Atkinson, R.1
-
110
-
-
79551699813
-
A survey of dht security techniques
-
Feb
-
G. Urdaneta, G. Pierre, and M. V. Steen, "A survey of dht security techniques, " ACM Comput. Surveys, vol. 43, no. 2, pp. 8:1-8:49, Feb. 2011.
-
(2011)
ACM Comput. Surveys
, vol.43
, Issue.2
, pp. 81-849
-
-
Urdaneta, G.1
Pierre, G.2
Steen, M.V.3
-
111
-
-
77956439681
-
The PADRES publish/subscribe system
-
Hershey, PA, USA: IGI Global
-
H.-A. Jacobsen et al., "The PADRES publish/subscribe system, " in Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies. Hershey, PA, USA: IGI Global, 2009.
-
(2009)
Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies
-
-
Jacobsen, H.-A.1
-
112
-
-
34548050218
-
A taxonomy for denial of service attacks in content-based publish/subscribe systems
-
Jun
-
A. Wun, A. Cheung, and H.-A. Jacobsen, "A taxonomy for denial of service attacks in content-based publish/subscribe systems, " in Proc. Inaugural Int. Conf. Distrib. Event-Based Syst., Jun. 2007, pp. 116-127.
-
(2007)
Proc. Inaugural Int. Conf. Distrib. Event-Based Syst.
, pp. 116-127
-
-
Wun, A.1
Cheung, A.2
Jacobsen, H.-A.3
-
113
-
-
0037250819
-
Security issues and solutions in multicast content distribution: A survey
-
Jan./Feb
-
P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey, " IEEE Netw., vol. 17, no. 1, pp. 30-36, Jan./Feb. 2003.
-
(2003)
IEEE Netw.
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
114
-
-
85084164565
-
Secure distribution of events in contentbased publish subscribe systems
-
Aug
-
L. Opyrchal and A. Prakash, "Secure distribution of events in contentbased publish subscribe systems, " in Proc. 10th USENIX Security Symp., Aug. 2001, pp. 1-16.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 1-16
-
-
Opyrchal, L.1
Prakash, A.2
-
115
-
-
84994275465
-
Towards an access control mechanism for wide-area publish/subscribe systems
-
Z. Miklos, "Towards an access control mechanism for wide-area publish/subscribe systems, " in Proc. 22nd Int. Conf. Distrib. Comput. Syst. Workshops, 2002, pp. 516-521.
-
(2002)
Proc. 22nd Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 516-521
-
-
Miklos, Z.1
-
116
-
-
1642279591
-
Implementing a prototype of the security framework for distributed brokering systems
-
Y. Yan et al., "Implementing a prototype of the security framework for distributed brokering systems, " in Proc. Int. Conf. Security Manage., 2003, pp. 212-218.
-
(2003)
Proc. Int. Conf. Security Manage
, pp. 212-218
-
-
Yan, Y.1
-
117
-
-
33746099222
-
Naradabrokering: A distributed middleware framework and architecture for enabling durable peer-to-peer grids
-
S. Pallickara and G. Fox, "Naradabrokering: A distributed middleware framework and architecture for enabling durable peer-to-peer grids, " in Proc. ACM/IFIP/USENIX Int. Conf. Middleware, 2003, pp. 41-61.
-
(2003)
Proc. ACM/IFIP/USENIX Int. Conf. Middleware
, pp. 41-61
-
-
Pallickara, S.1
Fox, G.2
-
118
-
-
46149104789
-
A framework for secure end-to-end delivery of messages in publish/subscribe systems
-
S. Pallickara et al., "A framework for secure end-to-end delivery of messages in publish/subscribe systems, " in Proc. 7th IEEE/ACM Int. Conf. Grid Comput., 2006, pp. 215-222.
-
(2006)
Proc. 7th IEEE/ACM Int. Conf. Grid Comput
, pp. 215-222
-
-
Pallickara, S.1
-
119
-
-
84929938473
-
Role-based access control for publish/subscribe middleware architectures
-
A. Belokosztolszki, D. Eyers, P. Pietzuch, J. Bacon, and K. Moody, "Role-based access control for publish/subscribe middleware architectures, " in Proc. 2nd Int. Workshop Distrib. Event-Based Syst., 2003, pp. 1-8.
-
(2003)
Proc. 2nd Int. Workshop Distrib. Event-Based Syst
, pp. 1-8
-
-
Belokosztolszki, A.1
Eyers, D.2
Pietzuch, P.3
Bacon, J.4
Moody, K.5
-
121
-
-
33749374771
-
A capability-based access control architecture for multi-domain publish/subscribe systems
-
L. Pesonen, D. Eyers, and J. Bacon, "A capability-based access control architecture for multi-domain publish/subscribe systems, " in Proc. Int. Symp. Appl. Internet, 2007, pp. 222-228.
-
(2007)
Proc. Int. Symp. Appl. Internet
, pp. 222-228
-
-
Pesonen, L.1
Eyers, D.2
Bacon, J.3
-
122
-
-
36549013845
-
Access control in decentralised publish/subscribe systems
-
Apr
-
L. Pesonen, D. Eyers, and J. Bacon, "Access control in decentralised publish/subscribe systems, " J. Netw., vol. 2, no. 2, pp. 57-67, Apr. 2006.
-
(2006)
J. Netw.
, vol.2
, Issue.2
, pp. 57-67
-
-
Pesonen, L.1
Eyers, D.2
Bacon, J.3
-
123
-
-
79953825568
-
Security policy and information sharing in distributed event-based systems
-
Berlin, Germany: Springer-Verlag
-
B. Shand et al., "Security policy and information sharing in distributed event-based systems, " in Reasoning in Event-Based Distributed Systems, vol. 347. Berlin, Germany: Springer-Verlag, 2011, pp. 151-172.
-
(2011)
Reasoning in Event-Based Distributed Systems
, vol.347
, pp. 151-172
-
-
Shand, B.1
-
124
-
-
31544456939
-
Security aspects in publish/subscribe systems
-
L. Fiege, A. Zeidler, A. Buchmann, R. K. Kehr, and G. Mühl, "Security aspects in publish/subscribe systems, " in Proc. 3rd Int. Workshop Distrib. Event-Based Syst., 2004, pp. 44-49.
-
(2004)
Proc. 3rd Int. Workshop Distrib. Event-Based Syst
, pp. 44-49
-
-
Fiege, L.1
Zeidler, A.2
Buchmann, A.3
Kehr, R.K.4
Mühl, G.5
-
125
-
-
78650441304
-
Design and implementation of the rebeca publish/subscribe middleware
-
Berlin, Germany: Springer-Verlag
-
H. Parzyjegla, D. Graff, A. Schröter, J. Richling, and G. Mühl, "Design and implementation of the rebeca publish/subscribe middleware, " in From Active Data Management to Event-Based Systems and More. Berlin, Germany: Springer-Verlag, 2010, pp. 124-140.
-
(2010)
From Active Data Management to Event-Based Systems and More
, pp. 124-140
-
-
Parzyjegla, H.1
Graff, D.2
Schröter, A.3
Richling, J.4
Mühl, G.5
-
126
-
-
33644536683
-
Scalable security and accounting services for contentbased publish/subscribe systems
-
H. Khurana, "Scalable security and accounting services for contentbased publish/subscribe systems, " in Proc. ACM Symp. Appl. Comput., 2005, pp. 801-807.
-
(2005)
Proc. ACM Symp. Appl. Comput
, pp. 801-807
-
-
Khurana, H.1
-
127
-
-
50049089599
-
Enabling confidentiality in contentbased publish/subscribe infrastructures
-
C. Raiciu and D. Rosenblum, "Enabling confidentiality in contentbased publish/subscribe infrastructures, " in Proc. Securecomm Workshops, 2006, pp. 1-11.
-
(2006)
Proc. Securecomm Workshops
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.2
-
128
-
-
33947668891
-
Dynamic access control in a content-based publish/subscribe system with delivery guarantees
-
Y. Zhao and D. Sturman, "Dynamic access control in a content-based publish/subscribe system with delivery guarantees, " in Proc. 26th IEEE Int. Conf. Distrib. Comput. Syst., 2006, pp. 1-8.
-
(2006)
Proc. 26th IEEE Int. Conf. Distrib. Comput. Syst
, pp. 1-8
-
-
Zhao, Y.1
Sturman, D.2
-
129
-
-
33947510802
-
Gryphon: An information flow based approach to message brokering
-
Paderborn, Germany
-
R. Strom et al., "Gryphon: An information flow based approach to message brokering, " in Proc. Int. Symp. Softw. Rel. Eng., Paderborn, Germany, 1998, pp. 1-2.
-
(1998)
Proc. Int. Symp. Softw. Rel. Eng.
, pp. 1-2
-
-
Strom, R.1
-
130
-
-
31044454785
-
A security framework for contentbased publish-subscribe system
-
Jul
-
G. Padmavathi and S. Annadurai, "A security framework for contentbased publish-subscribe system, " J. Electron. Commerce Res. Appl., vol. 5, no. 1, pp. 78-90, Jul. 2006.
-
(2006)
J. Electron. Commerce Res. Appl.
, vol.5
, Issue.1
, pp. 78-90
-
-
Padmavathi, G.1
Annadurai, S.2
-
131
-
-
84868688003
-
Quip: A protocol for securing content in peer-to-peer publish/subscribe overlay networks
-
A. Corman, P. Schachte, and V. Teague, "Quip: A protocol for securing content in peer-to-peer publish/subscribe overlay networks, " in Proc. 30th Australasian Conf. Comput. Sci., 2007, vol. 62, pp. 35-40.
-
(2007)
Proc. 30th Australasian Conf. Comput. Sci
, vol.62
, pp. 35-40
-
-
Corman, A.1
Schachte, P.2
Teague, V.3
-
133
-
-
84863145281
-
Eventguard: A system architecture for securing publish-subscribe networks
-
Dec
-
M. Srivatsa, L. Liu, and A. Iyengar, "Eventguard: A system architecture for securing publish-subscribe networks, " ACM Trans. Comput. Syst., vol. 29, no. 4, pp. 10:1-10:40, Dec. 2011.
-
(2011)
ACM Trans. Comput. Syst.
, vol.29
, Issue.4
, pp. 101-1040
-
-
Srivatsa, M.1
Liu, L.2
Iyengar, A.3
-
134
-
-
70350786565
-
A security plane for publish/subscribe based content oriented networks
-
W. Wong, F. Verdi, and F. Magalhães, "A security plane for publish/subscribe based content oriented networks, " in Proc. ACM CoNEXT Conf., 2008, pp. 45:1-45:2.
-
(2008)
Proc. ACM CoNEXT Conf
, pp. 451-452
-
-
Wong, W.1
Verdi, F.2
Magalhães, F.3
-
135
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
May
-
A. Shikfa, M. Onen, and R. Molva, "Privacy-preserving content-based publish/subscribe networks, " in Proc. Emerging Challenges Security, Privacy Trust-24th IFIP TC 11 Int. Inf. Security Conf., May 2009, pp. 270-282.
-
(2009)
Proc. Emerging Challenges Security, Privacy Trust-24th IFIP TC 11 Int. Inf. Security Conf.
, pp. 270-282
-
-
Shikfa, A.1
Onen, M.2
Molva, R.3
-
136
-
-
77957660328
-
On the privacy protection in publish/subscribe systems
-
W. Chen, J. Jiang, and N. Skocik, "On the privacy protection in publish/subscribe systems, " in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 597-601.
-
(2010)
Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security
, pp. 597-601
-
-
Chen, W.1
Jiang, J.2
Skocik, N.3
-
137
-
-
78651101167
-
Towards a cryptographic treatment of publish/subscribe systems
-
Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
-
T.-H. Yuen, W. Susilo, and Y. Mu, "Towards a cryptographic treatment of publish/subscribe systems, " in Cryptology and Network Security, vol. 6467, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2010, pp. 201-220.
-
(2010)
Cryptology and Network Security
, vol.6467
, pp. 201-220
-
-
Yuen, T.-H.1
Susilo, W.2
Mu, Y.3
-
138
-
-
78049360046
-
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
-
S. Choi, G. Ghinita, and E. Bertino, "A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations, " in Proc. 21st Int. Conf. Database Expert Syst. Appl. I, 2010, pp. 368-384.
-
(2010)
Proc. 21st Int. Conf. Database Expert Syst. Appl.
, vol.1
, pp. 368-384
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
139
-
-
84859443849
-
Design and implementation of a confidentiality and access control solution for publish/subscribe systems
-
May
-
M. Ion, G. Russello, and B. Crispo, "Design and implementation of a confidentiality and access control solution for publish/subscribe systems, " Comput. Netw., vol. 56, no. 7, pp. 2014-2037, May 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.7
, pp. 2014-2037
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
140
-
-
84864055603
-
Efficient privacy preserving content based publish subscribe systems
-
Jun.
-
M. Nabeel, N. Shang, and E. Bertino, "Efficient privacy preserving content based publish subscribe systems, " in Proc. 17th ACM Symp. Access Control Models Technol., Jun. 2012, pp. 133-144.
-
(2012)
Proc. 17th ACM Symp. Access Control Models Technol.
, pp. 133-144
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
141
-
-
84883353658
-
Privacy preserving context aware publish subscribe systems
-
Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
-
M. Nabeel, S. Appel, E. Bertino, and A. Buchmann, "Privacy preserving context aware publish subscribe systems, " in Network and System Security, vol. 7873, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2013, pp. 465-478.
-
(2013)
Network and System Security
, vol.7873
, pp. 465-478
-
-
Nabeel, M.1
Appel, S.2
Bertino, E.3
Buchmann, A.4
-
142
-
-
84929580298
-
Identity management and integrity protection in publish-subscribe systems
-
Berlin, Germany: Springer-Verlag
-
A. Fongen and F. Mancini, "Identity management and integrity protection in publish-subscribe systems, " in Policies and Research in Identity Management, vol. 396. Berlin, Germany: Springer-Verlag, 2013, pp. 68-82.
-
(2013)
Policies and Research in Identity Management
, vol.396
, pp. 68-82
-
-
Fongen, A.1
Mancini, F.2
-
143
-
-
84891787641
-
Securing broker-less publish/subscribe systems using identity-based encryption
-
Feb
-
M. Tariq, B. Koldehofe, and K. Rothermel, "Securing broker-less publish/subscribe systems using identity-based encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 518-528, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 518-528
-
-
Tariq, M.1
Koldehofe, B.2
Rothermel, K.3
-
144
-
-
84944060627
-
Engineering eventbased systems with scopes
-
L. Fiege, M. Mezini, G. Mühl, and A. Buchmann, "Engineering eventbased systems with scopes, " in Proc. 16th Eur. Conf. Object-Oriented Programm., 2002, pp. 309-333.
-
(2002)
Proc. 16th Eur. Conf. Object-Oriented Programm
, pp. 309-333
-
-
Fiege, L.1
Mezini, M.2
Mühl, G.3
Buchmann, A.4
-
146
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B.Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
147
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
Nov
-
J. Bacon, K. Moody, and W. Yao, "A model of oasis role-based access control and its support for active security, " ACM Trans. Inf. Syst. Security, vol. 5, no. 4, pp. 492-540, Nov. 2002.
-
(2002)
ACM Trans. Inf. Syst. Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
148
-
-
84869403191
-
Architecture patterns for a ubiquitous identity management system
-
Jan.
-
A. Fongen, "Architecture patterns for a ubiquitous identity management system, " in Proc. 6th Int. Conf. Syst., Jan. 2011, pp. 66-71.
-
(2011)
Proc. 6th Int. Conf. Syst.
, pp. 66-71
-
-
Fongen, A.1
-
149
-
-
80053979754
-
A framework for authentication in nbd tactical ad hoc networks
-
Oct
-
A. Hegland, E.Winjum, and O.-E. Hedenstad, "A framework for authentication in nbd tactical ad hoc networks, " IEEE Commun. Mag., vol. 49, no. 10, pp. 64-71, Oct. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.10
, pp. 64-71
-
-
Hegland, A.1
Winjum, E.2
Hedenstad, O.-E.3
-
150
-
-
0345565893
-
A survey of key management for secure group communication
-
Sep
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication, " ACM Comput. Surveys, vol. 35, no. 3, pp. 309- 329, Sep. 2003.
-
(2003)
ACM Comput. Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
152
-
-
3142512728
-
Tree-based group key agreement
-
Feb
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement, " ACM Trans. Inf. Syst. Security, vol. 7, no. 1, pp. 60-96, Feb. 2004.
-
(2004)
ACM Trans. Inf. Syst. Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
153
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
Oct
-
S. Mittra, "Iolus: A framework for scalable secure multicasting, " SIGCOMMComputCommun.Rev., vol. 27, no. 4, pp. 277-288, Oct. 1997.
-
(1997)
SIGCOMMComputCommun.Rev.
, vol.27
, Issue.4
, pp. 277-288
-
-
Mittra, S.1
-
154
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs, " IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16- 30, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Netw.
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
155
-
-
84937411419
-
A public-key traitor tracing scheme with revocation using dynamic shares
-
Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
-
W.-G. Tzeng and Z.-J. Tzeng, "A public-key traitor tracing scheme with revocation using dynamic shares, " in Public Key Cryptography, vol. 1992, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2001, pp. 207-224.
-
(2001)
Public Key Cryptography
, vol.1992
, pp. 207-224
-
-
Tzeng, W.-G.1
Tzeng, Z.-J.2
-
156
-
-
54249101916
-
Public key encryption with keyword search revisited
-
Lecture Notes in Computer Science
-
J. Baek, R. Safavi-Naini, andW. Susilo, "Public key encryption with keyword search revisited, " in Proc. Int. Conf. Comput. Sci. Appl., vol. 5072, Lecture Notes in Computer Science, 2008, pp. 1249-1259.
-
(2008)
Proc. Int. Conf. Comput. Sci. Appl.
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
158
-
-
0043026142
-
-
Accessed: Apr. 2013
-
M. Bartel, J. Boyer, B. Fox, B. L. Macchia, and E. Simon, XMLSignature Syntax and Processing, Accessed: Apr. 2013. [Online]. Available: http://fusesource.com/community/fuse-customers/
-
XMLSignature Syntax and Processing
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
Macchia, B.L.4
Simon, E.5
-
159
-
-
57549093852
-
Access control in publish/subscribe systems
-
J. Bacon, D. Eyers, J. Singh, and P. Pietzuch, "Access control in publish/subscribe systems, " in Proc. 2nd Int. Conf. Distrib. Event-Based Syst., 2008, pp. 23-34.
-
(2008)
Proc. 2nd Int. Conf. Distrib. Event-Based Syst
, pp. 23-34
-
-
Bacon, J.1
Eyers, D.2
Singh, J.3
Pietzuch, P.4
-
160
-
-
84857214330
-
Forbid: Cope with byzantine behaviors in wireless multi-path routing and forwarding
-
X. Su, G. Peng, and S. Chan, "Forbid: Cope with byzantine behaviors in wireless multi-path routing and forwarding, " in Proc. IEEE Global Telecommun. Conf., 2011, pp. 1-6.
-
(2011)
Proc. IEEE Global Telecommun. Conf.
, pp. 1-6
-
-
Su, X.1
Peng, G.2
Chan, S.3
-
161
-
-
0031605747
-
The securering protocols for securing group communication
-
K. Kihlstrom, L. Moser, and P. Melliar-Smith, "The securering protocols for securing group communication, " in Proc. 31st Annu. Hawaii Int. Conf. Syst. Sci., 1998, vol. 3, pp. 317-326.
-
(1998)
Proc. 31st Annu. Hawaii Int. Conf. Syst. Sci
, vol.3
, pp. 317-326
-
-
Kihlstrom, K.1
Moser, L.2
Melliar-Smith, P.3
-
162
-
-
84944073206
-
Monitoring, security, dynamic configuration with the dynamic TAO reflective ORB
-
F. Kon et al., "Monitoring, security, dynamic configuration with the dynamic TAO reflective ORB, " in Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms, 2000, pp. 121-143.
-
(2000)
Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms
, pp. 121-143
-
-
Kon, F.1
-
163
-
-
0033489645
-
Optimistic security: A new access control paradigm
-
D. Povey, "Optimistic security: A new access control paradigm, " in Proc. Workshop New Security Paradigms, 2000, pp. 40-45.
-
(2000)
Proc. Workshop New Security Paradigms
, pp. 40-45
-
-
Povey, D.1
-
164
-
-
33846576210
-
Audit-based access control for electronic health records
-
Feb
-
M. Dekker and S. Etalle, "Audit-based access control for electronic health records, " Electron. Notes Theor. Comput. Sci., vol. 168, pp. 221- 236, Feb. 2007.
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.168
, pp. 221-236
-
-
Dekker, M.1
Etalle, S.2
-
166
-
-
80052086152
-
Risk-based decision method for access control systems
-
R. Shaikh, K. Adi, L. Logrippo, and S. Mankovski, "Risk-based decision method for access control systems, " in Proc. 9th Annu. Int. Conf. Privacy, Security Trust, 2011, pp. 189-192.
-
(2011)
Proc. 9th Annu. Int. Conf. Privacy, Security Trust
, pp. 189-192
-
-
Shaikh, R.1
Adi, K.2
Logrippo, L.3
Mankovski, S.4
-
167
-
-
78651519205
-
Reputation service and reputation based access control
-
L. Su, W. Wang, and A. Niu, "Reputation service and reputation based access control, " in Proc. Int. Conf. E-Prod. E-Serv. E-Entertain., 2010, pp. 1-4.
-
(2010)
Proc. Int. Conf. E-Prod. E-Serv. E-Entertain.
, pp. 1-4
-
-
Su, L.1
Wang, W.2
Niu, A.3
-
169
-
-
84929589238
-
-
42 CFR Part 59-Attachment B, U.S. Department of Health and Human Services, Washington, DC, USA, 2000, Accessed: Jan. 2014
-
42 CFR Part 59-Attachment B, U.S. Department of Health and Human Services, Washington, DC, USA, 2000, Accessed: Jan. 2014. [Online]. Available: http://www.hhs.gov/opa/title-x-family-planning/title-x-policies/program-guidelines/
-
-
-
-
170
-
-
0033314753
-
An overview of PKI trust models
-
Nov
-
R. Perlman, "An overview of PKI trust models, " IEEE Netw., vol. 13, no. 6, pp. 38-43, Nov. 1999.
-
(1999)
IEEE Netw.
, vol.13
, Issue.6
, pp. 38-43
-
-
Perlman, R.1
-
171
-
-
84942438500
-
Batch rekeying for secure group communications
-
X. Li, Y. R. Yang, M. Gouda, and S. Lam, "Batch rekeying for secure group communications, " in Proc. 10th Int. Conf. World Wide Web, 2001, pp. 525-534.
-
(2001)
Proc. 10th Int. Conf. World Wide Web
, pp. 525-534
-
-
Li, X.1
Yang, Y.R.2
Gouda, M.3
Lam, S.4
-
172
-
-
33645989774
-
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
-
Apr
-
P. Lee, J.-S. Lui, and D. Yau, "Distributed collaborative key agreement and authentication protocols for dynamic peer groups, " IEEE/ACM Trans. Netw., vol. 14, no. 2, pp. 263-276, Apr. 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.2
, pp. 263-276
-
-
Lee, P.1
Lui, J.-S.2
Yau, D.3
-
173
-
-
59649129992
-
Approximately optimal trees for group key management with batch updates
-
Mar
-
M. Li, Z. Feng, N. Zang, R. Graham, and F. Yao, "Approximately optimal trees for group key management with batch updates, " Theor. Comput. Sci., vol. 410, no. 11, pp. 1013-1021, Mar. 2009.
-
(2009)
Theor. Comput. Sci.
, vol.410
, Issue.11
, pp. 1013-1021
-
-
Li, M.1
Feng, Z.2
Zang, N.3
Graham, R.4
Yao, F.5
-
174
-
-
84878140770
-
Secure distributed batch rekeying algorithm for dynamic group
-
Nov.
-
B. Li, Y. Yang, Z. Lu, B. Yuan, and T. Long, "Secure distributed batch rekeying algorithm for dynamic group, " in Proc. IEEE 14th Int. Conf. Commun. Technol., Nov. 2012, pp. 664-667.
-
(2012)
Proc. IEEE 14th Int. Conf. Commun. Technol.
, pp. 664-667
-
-
Li, B.1
Yang, Y.2
Lu, Z.3
Yuan, B.4
Long, T.5
-
175
-
-
0347946946
-
Protocol design for scalable and reliable group rekeying
-
Dec
-
X. Zhang, S. Lam, D.-Y. Lee, and Y. Yang, "Protocol design for scalable and reliable group rekeying, " IEEE/ACM Trans. Netw., vol. 11, no. 6, pp. 908-922, Dec. 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.6
, pp. 908-922
-
-
Zhang, X.1
Lam, S.2
Lee, D.-Y.3
Yang, Y.4
-
176
-
-
35048839833
-
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
-
Lecture Notes in Computer Science
-
Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin, "Randomness extraction and key derivation using the CBC, cascade and HMAC modes, " in Proc. Adv. CRYPTO, vol. 3152, Lecture Notes in Computer Science, 2004, pp. 494-510.
-
(2004)
Proc. Adv. CRYPTO
, vol.3152
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
177
-
-
34848843875
-
A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
-
Dec
-
A. Pour, K. Kumekawa, T. Kato, and S. Itoh, "A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation, " Comput. Netw., vol. 51, no. 17, pp. 4727-4743, Dec. 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.17
, pp. 4727-4743
-
-
Pour, A.1
Kumekawa, K.2
Kato, T.3
Itoh, S.4
-
178
-
-
54349088694
-
Secure and efficient group key management with shared key derivation
-
Jan
-
J.-C. Lin, K.-H. Huang, F. Lai, and H.-C. Lee, "Secure and efficient group key management with shared key derivation, " Comput. Std. Interfaces, vol. 31, no. 1, pp. 192-208, Jan. 2009.
-
(2009)
Comput. Std. Interfaces
, vol.31
, Issue.1
, pp. 192-208
-
-
Lin, J.-C.1
Huang, K.-H.2
Lai, F.3
Lee, H.-C.4
-
179
-
-
79953328490
-
Flexible robust group key agreement
-
May
-
S. Jarecki, K. Jihye, and G. Tsudik, "Flexible robust group key agreement, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 879-886, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 879-886
-
-
Jarecki, S.1
Jihye, K.2
Tsudik, G.3
-
180
-
-
84877577710
-
A survey of group key distribution schemes with self-healing property
-
T. Rams and P. Pacyna, "A survey of group key distribution schemes with self-healing property, " IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 820-842, 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.2
, pp. 820-842
-
-
Rams, T.1
Pacyna, P.2
-
181
-
-
0345490607
-
Certificateless public key cryptography
-
Lecture Notes in Computer Science
-
S. Al-Riyami and K. Paterson, "Certificateless public key cryptography, " in Proc. Adv. ASIACRYPT, vol. 2894, Lecture Notes in Computer Science, 2003, pp. 452-473.
-
(2003)
Proc. Adv. ASIACRYPT
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
182
-
-
84859548489
-
Strongly secure certificateless short signatures
-
Jun
-
R. Tso, X. Huang, and W. Susilo, "Strongly secure certificateless short signatures, " J. Syst. Softw., vol. 85, no. 6, pp. 1409-1417, Jun. 2012.
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.6
, pp. 1409-1417
-
-
Tso, R.1
Huang, X.2
Susilo, W.3
-
183
-
-
84857368369
-
An efficient RSA-based certificateless signature scheme
-
Mar
-
J. Zhang and J. Mao, "An efficient RSA-based certificateless signature scheme, " J. Syst. Softw., vol. 85, no. 3, pp. 638-642, Mar. 2012.
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.3
, pp. 638-642
-
-
Zhang, J.1
Mao, J.2
-
184
-
-
85024290278
-
Group signatures
-
Lecture Notes in Computer Science
-
D. Chaum and E. Heyst, "Group signatures, " in Proc. Adv. EUROCRYPT, vol. 547, Lecture Notes in Computer Science, 1991, pp. 257-265.
-
(1991)
Proc. Adv. EUROCRYPT
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.2
-
185
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Lecture Notes in Computer Science
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials, " in Proc. Adv. CRYPTO, vol. 2442, Lecture Notes in Computer Science, 2002, pp. 61-76.
-
(2002)
Proc. Adv. CRYPTO
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
186
-
-
35048887476
-
Short group signatures
-
Lecture Notes in Computer Science
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures, " in Proc. Adv. CRYPTO, vol. 3152, Lecture Notes in Computer Science, 2004, pp. 41-55.
-
(2004)
Proc. Adv. CRYPTO
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
187
-
-
33845604652
-
Group signatures with reduced bandwidth
-
Dec
-
S. Zhou and D. Lin, "Group signatures with reduced bandwidth, " Proc. Inst. Elect. Eng.-Inf. Security, vol. 153, no. 4, pp. 146-152, Dec. 2006.
-
(2006)
Proc. Inst. Elect. Eng.-Inf. Security
, vol.153
, Issue.4
, pp. 146-152
-
-
Zhou, S.1
Lin, D.2
-
188
-
-
84946833891
-
How to leak a secret
-
Lecture Notes in Computer Science
-
R. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret, " in Proc. Adv. ASIACRYPT, vol. 2248, Lecture Notes in Computer Science, 2001, pp. 552-565.
-
(2001)
Proc. Adv. ASIACRYPT
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
189
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation, " in Proc. 3rd ACM Conf. Comput. Commun. Security, 1996, pp. 48-57.
-
(1996)
Proc. 3rd ACM Conf. Comput. Commun. Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
190
-
-
64749109626
-
An efficient id-based proxy ring signature scheme
-
Jan
-
W. Lei and L. Daxing, "An efficient id-based proxy ring signature scheme, " in Proc. WRI Int. Conf. Commun. Mobile Comput., Jan. 2009, vol. 3, pp. 560-563.
-
(2009)
Proc. WRI Int. Conf. Commun. Mobile Comput.
, vol.3
, pp. 560-563
-
-
Lei, W.1
Daxing, L.2
-
191
-
-
0003735739
-
-
Univ. Waterloo, Waterloo, ON, Canada, Accessed: Mar. 2014
-
D. Johnson and A. Menezes, "The Elliptic Curve Digital Signature Algorithm (ECDSA), " Univ. Waterloo, Waterloo, ON, Canada, 2000, Accessed: Mar. 2014. [Online]. Available: http://cacr.uwaterloo.ca/techreports/1999/corr99-34.pdf
-
(2000)
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
-
Johnson, D.1
Menezes, A.2
-
192
-
-
62749138415
-
Optimization based rate control for multicast with network coding: A multipath formulation
-
Dec
-
T. Cui, L. Chen, and T. Ho, "Optimization based rate control for multicast with network coding: A multipath formulation, " in Proc. 46th IEEE Conf. Decision Control, Dec. 2007, pp. 6041-6046.
-
(2007)
Proc. 46th IEEE Conf. Decision Control
, pp. 6041-6046
-
-
Cui, T.1
Chen, L.2
Ho, T.3
-
193
-
-
79956125472
-
Network coding based reliable disjoint and braided multipath routing for sensor networks
-
Jul
-
Y. Yang, C. Zhong, Y. Sun, and J. Yang, "Network coding based reliable disjoint and braided multipath routing for sensor networks, " J. Netw. Comput. Appl., vol. 33, no. 4, pp. 422-432, Jul. 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.4
, pp. 422-432
-
-
Yang, Y.1
Zhong, C.2
Sun, Y.3
Yang, J.4
-
194
-
-
84871993542
-
A resilient architecture for forensic storage of events in critical infrastructures
-
M. Afzaal, C. D. Sarno, L. Coppolino, S. D'Antonio, and L. Romano, "A resilient architecture for forensic storage of events in critical infrastructures, " in Proc. IEEE 14th Int. Symp. High-Assur. Syst. Eng., 2012, pp. 48-55.
-
(2012)
Proc. IEEE 14th Int. Symp. High-Assur. Syst. Eng.
, pp. 48-55
-
-
Afzaal, M.1
Sarno, C.D.2
Coppolino, L.3
D'Antonio, S.4
Romano, L.5
-
196
-
-
0026869241
-
Analysis and modeling of correlated failures in multicomputer systems
-
May
-
D. Tang and R. Iyer, "Analysis and modeling of correlated failures in multicomputer systems, " IEEE Trans. Comput., vol. 41, no. 5, pp. 567- 577, May 1992.
-
(1992)
IEEE Trans. Comput.
, vol.41
, Issue.5
, pp. 567-577
-
-
Tang, D.1
Iyer, R.2
-
197
-
-
80051915968
-
Improving logbased field failure data analysis of multi-node computing systems
-
Jun.
-
A. Pecchia, D. Cotroneo, Z. Kalbarczyk, and R. Iyer, "Improving logbased field failure data analysis of multi-node computing systems, " in Proc. IEEE/IFIP 41st Int. Conf. Dependable Syst. Netw., Jun. 2011, pp. 97-108.
-
(2011)
Proc. IEEE/IFIP 41st Int. Conf. Dependable Syst. Netw.
, pp. 97-108
-
-
Pecchia, A.1
Cotroneo, D.2
Kalbarczyk, Z.3
Iyer, R.4
-
198
-
-
33746601556
-
A self-organizing crash-resilient topology management system for content-based publish/subscribe
-
Jan
-
R. Baldoni, R. Beraldi, L. Querzoni, and A. Virgillito, "A self-organizing crash-resilient topology management system for content-based publish/subscribe, " in Proc. Int. Workshop Distrib. Event-Based Syst., Jan. 2004, pp. 3-87.
-
(2004)
Proc. Int. Workshop Distrib. Event-Based Syst.
, pp. 3-87
-
-
Baldoni, R.1
Beraldi, R.2
Querzoni, L.3
Virgillito, A.4
-
199
-
-
70349984415
-
On exploiting decentralized bio-inspired self-organization algorithms to develop real systems
-
May
-
E. D. Nitto, D. Dubois, and R. Mirandola, "On exploiting decentralized bio-inspired self-organization algorithms to develop real systems, " in Proc. Int. Workshop Softw. Eng. Adapt. Self-Managing Syst., May 2009, pp. 68-75.
-
(2009)
Proc. Int. Workshop Softw. Eng. Adapt. Self-Managing Syst.
, pp. 68-75
-
-
Nitto, E.D.1
Dubois, D.2
Mirandola, R.3
-
200
-
-
84856111188
-
Investigation on safety-related standards for critical systems
-
Nov.
-
C. Esposito, D. Cotroneo, and N. Silva, "Investigation on safety-related standards for critical systems, " in Proc. 1st Int. Workshop Softw. Certification, Nov. 2011, pp. 49-54.
-
(2011)
Proc. 1st Int. Workshop Softw. Certification
, pp. 49-54
-
-
Esposito, C.1
Cotroneo, D.2
Silva, N.3
-
201
-
-
84884306650
-
Middleware for security and safety critical systems
-
May
-
G. Uchenick, "Middleware for security and safety critical systems, " in Proc. Embedded Syst. Europe, May 2006, pp. 24-26.
-
(2006)
Proc. Embedded Syst. Europe
, pp. 24-26
-
-
Uchenick, G.1
-
202
-
-
51049092736
-
Performance assessment of omg compliant data distribution middleware
-
Apr
-
C. Esposito, S. Russo, and D. Di Crescenzo, "Performance assessment of omg compliant data distribution middleware, " in Proc. IEEE Int. Symp. Parallel Distrib. Process., Apr. 2008, pp. 1-8.
-
(2008)
Proc. IEEE Int. Symp. Parallel Distrib. Process.
, pp. 1-8
-
-
Esposito, C.1
Russo, S.2
Di Crescenzo, D.3
-
204
-
-
84929589239
-
-
OMG, CORBA Security Specifications. Accessed: December 2012
-
OMG, CORBA Security Specifications. Accessed: December 2012. [Online]. Available: www.omg.org/
-
-
-
-
207
-
-
84929589240
-
-
OMG, DDS Interoperability Protocol (DDSI), Needham, MA, USA Accessed: Sep.
-
OMG, DDS Interoperability Protocol (DDSI), Needham, MA, USA, Accessed: Sep. 2012. [Online]. Available: www.omg.org
-
(2012)
-
-
-
208
-
-
79955757995
-
The design and implementation of datagram TLS
-
San Diego, CA, USA, Feb
-
N. Modadugu and E. Rescorla, "The design and implementation of datagram TLS, " in Proc. Netw. Distrib. Syst. Security Symp., San Diego, CA, USA, Feb. 2004, pp. 1-7.
-
(2004)
Proc. Netw. Distrib. Syst. Security Symp.
, pp. 1-7
-
-
Modadugu, N.1
Rescorla, E.2
-
210
-
-
84868111872
-
XML and web services security standards
-
Apr
-
N. A. Nordbotten, "XML and web services security standards, " IEEE Commun. Surveys Tuts., vol. 36, no. 4, pp. 96-98, Apr. 2003.
-
(2003)
IEEE Commun. Surveys Tuts.
, vol.36
, Issue.4
, pp. 96-98
-
-
Nordbotten, N.A.1
-
211
-
-
84868153414
-
Standards for XML and web services security
-
M. Naedele, "Standards for XML and web services security, " IEEE Comput. Mag., vol. 11, no. 3, pp. 4-21, 2009.
-
(2009)
IEEE Comput. Mag.
, vol.11
, Issue.3
, pp. 4-21
-
-
Naedele, M.1
-
215
-
-
0036711886
-
An overview of standards and related technology in web services
-
Sep./Nov
-
A. Tsalgatidou and T. Pilioura, "An overview of standards and related technology in web services, " Distrib. Parallel Databases, vol. 12, no. 1/2, pp. 135-162, Sep./Nov. 2002.
-
(2002)
Distrib. Parallel Databases
, vol.12
, Issue.1-2
, pp. 135-162
-
-
Tsalgatidou, A.1
Pilioura, T.2
-
216
-
-
67650790156
-
Logging in the age of web services
-
Jun
-
A. Chuvakin and G. Peterson, "Logging in the age of web services, " IEEE Security Privacy, vol. 7, no. 3, pp. 82-85, Jun. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.3
, pp. 82-85
-
-
Chuvakin, A.1
Peterson, G.2
|