메뉴 건너뛰기




Volumn 17, Issue 2, 2015, Pages 966-997

On security in publish/subscribe services: A survey

Author keywords

Multicast; Publish subscribe services; Security

Indexed keywords

MULTICASTING; PUBLISHING; SURVEYS;

EID: 84929587517     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2014.2364616     Document Type: Review
Times cited : (50)

References (217)
  • 2
    • 84883170089 scopus 로고    scopus 로고
    • An event-based notification approach for the delivery of patient medical information
    • Jan.
    • C. Esposito, M. Ciampi, and G. De Pietro, "An event-based notification approach for the delivery of patient medical information, " Inf. Syst., vol. 39, pp. 22-44, Jan. 2014.
    • (2014) Inf. Syst. , vol.39 , pp. 22-44
    • Esposito, C.1    Ciampi, M.2    De Pietro, G.3
  • 3
    • 84858153176 scopus 로고    scopus 로고
    • On data dissemination for large-scale complex critical infrastructures
    • Mar.
    • M. Cinque, C. Di Martino, and C. Esposito, "On data dissemination for large-scale complex critical infrastructures, " Comput. Netw., vol. 56, no. 4, pp. 1215-1235, Mar. 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.4 , pp. 1215-1235
    • Cinque, M.1    Di Martino, C.2    Esposito, C.3
  • 4
    • 33751524316 scopus 로고    scopus 로고
    • Service-oriented architecture for distributed publish/subscribe middleware in electronics production
    • Nov
    • I. Delamer and J. Lastra, "Service-oriented architecture for distributed publish/subscribe middleware in electronics production, " IEEE Trans. Ind. Informat., vol. 2, no. 4, pp. 281-294, Nov. 2006.
    • (2006) IEEE Trans. Ind. Informat. , vol.2 , Issue.4 , pp. 281-294
    • Delamer, I.1    Lastra, J.2
  • 5
    • 84929589225 scopus 로고    scopus 로고
    • Data Distribution Service (DDS) for Real-Time Systems OMG Needham MA USA, Accessed: Sep. 2012. [Online]
    • Data Distribution Service (DDS) for Real-Time Systems, OMG, Needham, MA, USA, 2007, Accessed: Sep. 2012. [Online]. Available: www.omg.org
    • (2007)
  • 6
    • 84929589226 scopus 로고    scopus 로고
    • Java Message Service, Sun Microsystems, Santa Clara, CA, USA, Accessed: Sep. 2012. [Online]
    • Java Message Service, Sun Microsystems, Santa Clara, CA, USA, 2002, Accessed: Sep. 2012. [Online]. Available: docs.sun.com/app/docs/doc/816-5904-10
    • (2002)
  • 7
    • 84929589227 scopus 로고    scopus 로고
    • FuseSource, FuseSource Customers, Accessed: Jul.
    • FuseSource, FuseSource Customers, Accessed: Jul. 2013. [Online]. Available: http://www.w3.org/TR/xmldsig-core
    • (2013)
  • 8
    • 84929589228 scopus 로고    scopus 로고
    • Real-Time Innovations (RTI), Industries Sunnyvale, CA USA, Accessed: Apr.
    • Real-Time Innovations (RTI), Industries, Sunnyvale, CA, USA, Accessed: Apr. 2013. [Online]. Available: http://www.rti.com/industries/customers.html
    • (2013)
  • 9
    • 84929589229 scopus 로고    scopus 로고
    • PrismTech Ltd., Industry Solutions Tyne and Wear U.K. Accessed: Apr.
    • PrismTech Ltd., Industry Solutions, Tyne and Wear, U.K., Accessed: Apr. 2013. [Online]. Available: http://www.prismtech.com/opensplice/industry-solutions
    • (2013)
  • 10
    • 84875726669 scopus 로고    scopus 로고
    • On reliability in publish/subscribe services
    • Apr
    • C. Esposito, D. Cotroneo, and S. Russo, "On reliability in publish/subscribe services, " Comput. Netw., vol. 57, no. 5, pp. 1318-1343, Apr. 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.5 , pp. 1318-1343
    • Esposito, C.1    Cotroneo, D.2    Russo, S.3
  • 13
    • 84929589230 scopus 로고    scopus 로고
    • CORBA Event Service Specification, OMG Needham, MA USA, Accessed: May 2011
    • CORBA Event Service Specification, OMG, Needham, MA, USA, 2001, Accessed: May 2011. [Online]. Available: www.omg.org/
    • (2001)
  • 14
    • 84929589231 scopus 로고    scopus 로고
    • Web Services Notification (WSN), OASIS Burlington, MA, USA, Accessed: Sep. 2012
    • Web Services Notification (WSN), OASIS, Burlington, MA, USA, 2006, Accessed: Sep. 2012. [Online]. Available: www.oasis-open.org/
    • (2006)
  • 17
    • 0030407910 scopus 로고    scopus 로고
    • The event notification pattern-Integrating implicit invocation with object-orientation
    • D. Riehle, "The event notification pattern-Integrating implicit invocation with object-orientation, " Theor. Pract. Obj. Syst., vol. 2, no. 1, pp. 43-52, 1996.
    • (1996) Theor. Pract. Obj. Syst. , vol.2 , Issue.1 , pp. 43-52
    • Riehle, D.1
  • 18
    • 84976813340 scopus 로고
    • Formalizing design spaces: Implicit invocation mechanisms
    • Lecture Notes in Computer Science
    • D. Garlan and D. Notkin, "Formalizing design spaces: Implicit invocation mechanisms, " in Proc. 4th Int. Symp. VDM Europe Formal Softw. Develop., vol. 551, Volume I, Lecture Notes in Computer Science, 1991, pp. 31-44.
    • (1991) Proc. 4th Int. Symp. VDM Europe Formal Softw. Develop. , vol.551 , pp. 31-44
    • Garlan, D.1    Notkin, D.2
  • 24
    • 0027809735 scopus 로고
    • The information bus: An architecture for extensible distributed systems
    • Dec
    • B. Oki, M. Pfluegl, A. Siegel, and D. Skeen, "The information bus: An architecture for extensible distributed systems, " ACM SIGOPS Oper. Syst. Rev., vol. 27, no. 5, pp. 58-68, Dec. 1993.
    • (1993) ACM SIGOPS Oper. Syst. Rev. , vol.27 , Issue.5 , pp. 58-68
    • Oki, B.1    Pfluegl, M.2    Siegel, A.3    Skeen, D.4
  • 25
    • 33846609442 scopus 로고    scopus 로고
    • Type-based publish/subscribe: Concepts and experiences
    • Jan
    • P. Eugster, "Type-based publish/subscribe: Concepts and experiences, " ACM Trans. Programm. Lang. Syst., vol. 29, no. 1, pp. 1-50, Jan. 2007.
    • (2007) ACM Trans. Programm. Lang. Syst. , vol.29 , Issue.1 , pp. 1-50
    • Eugster, P.1
  • 26
    • 0012179838 scopus 로고    scopus 로고
    • A design framework for internet-scale event observation and notification
    • Nov
    • D. Rosenblum and A.Wolf, "A design framework for internet-scale event observation and notification, " ACM SIGSOFT Softw. Eng. Notes, vol. 22, no. 6, pp. 344-360, Nov. 1997.
    • (1997) ACM SIGSOFT Softw. Eng. Notes , vol.22 , Issue.6 , pp. 344-360
    • Rosenblum, D.1    Wolf, A.2
  • 29
    • 77249108336 scopus 로고    scopus 로고
    • Routing algorithms for content-based publish/subscribe systems
    • J. Martins and S. Duarte, "Routing algorithms for content-based publish/subscribe systems, " IEEE Commun. Surveys Tuts., vol. 12, no. 1, pp. 39- 58, 2010.
    • (2010) IEEE Commun. Surveys Tuts. , vol.12 , Issue.1 , pp. 39-58
    • Martins, J.1    Duarte, S.2
  • 30
    • 0031701073 scopus 로고    scopus 로고
    • Multicast transport protocols: A survey and taxonomy
    • Jan
    • K. Obraczka, "Multicast transport protocols: A survey and taxonomy, " IEEE Commun. Mag., vol. 36, no. 1, pp. 94-102, Jan. 1998.
    • (1998) IEEE Commun. Mag. , vol.36 , Issue.1 , pp. 94-102
    • Obraczka, K.1
  • 31
    • 3943050736 scopus 로고    scopus 로고
    • A survey of application level multicast techniques
    • Sep
    • C. K. Yeo, B. S. Lee, and M. H. Er, "A survey of application level multicast techniques, " Comput. Commun., vol. 27, no. 15, pp. 1547- 1568, Sep. 2004.
    • (2004) Comput. Commun. , vol.27 , Issue.15 , pp. 1547-1568
    • Yeo, C.K.1    Lee, B.S.2    Er, M.H.3
  • 34
    • 0025430666 scopus 로고
    • Multicast routing in datagram internetworks and extended LANs
    • May
    • S. Deering and D. Cheriton, "Multicast routing in datagram internetworks and extended LANs, " ACM Trans. Comput. Syst., vol. 8, no. 2, pp. 85-100, May 1990.
    • (1990) ACM Trans. Comput. Syst. , vol.8 , Issue.2 , pp. 85-100
    • Deering, S.1    Cheriton, D.2
  • 35
    • 0030126833 scopus 로고    scopus 로고
    • The PIM architecture for wide-area multicast routing
    • Apr
    • S. Deering et al., "The PIM architecture for wide-area multicast routing, " IEEE/ACM Trans. Netw., vol. 4, no. 2, pp. 784-803, Apr. 1997.
    • (1997) IEEE/ACM Trans. Netw. , vol.4 , Issue.2 , pp. 784-803
    • Deering, S.1
  • 36
    • 78650086305 scopus 로고    scopus 로고
    • A survey on the design, applications, enhancements of application-layer overlay networks
    • Nov.
    • J. Kurian and K. Sarac, "A survey on the design, applications, enhancements of application-layer overlay networks, " ACM Comput. Surveys, vol. 43, no. 1, pp. 5:1-5:34, Nov. 2010.
    • (2010) ACM Comput. Surveys , vol.43 , Issue.1 , pp. 51-534
    • Kurian, J.1    Sarac, K.2
  • 37
    • 34447329493 scopus 로고    scopus 로고
    • Mesh or multiple-tree: A comparative study of live P2P streaming approaches
    • May
    • N. Magharei, R. Rejaie, and Y. Guo, "Mesh or multiple-tree: A comparative study of live P2P streaming approaches, " in Proc. 26th IEEE Int. Conf. Comput. Commun., May 2007, pp. 1424-1432.
    • (2007) Proc. 26th IEEE Int. Conf. Comput. Commun. , pp. 1424-1432
    • Magharei, N.1    Rejaie, R.2    Guo, Y.3
  • 38
    • 0001776520 scopus 로고    scopus 로고
    • Group communication specifications: A comprehensive study
    • Dec
    • G. V. Chockler, I. Keidar, and R. Vitenberg, "Group communication specifications: A comprehensive study, " ACM Comput. Surveys, vol. 33, no. 4, pp. 427-469, Dec. 2001.
    • (2001) ACM Comput. Surveys , vol.33 , Issue.4 , pp. 427-469
    • Chockler, G.V.1    Keidar, I.2    Vitenberg, R.3
  • 39
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area event notification service
    • Aug
    • A. Carzaniga, D. Rosenblum, and A. Wolf, "Design and evaluation of a wide-area event notification service, " ACMTrans. Comput. Syst., vol. 19, no. 3, pp. 332-383, Aug. 2001.
    • (2001) ACMTrans. Comput. Syst. , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.2    Wolf, A.3
  • 40
    • 0036802048 scopus 로고    scopus 로고
    • Scribe: A largescale and decentralized application-level multicast infrastructure
    • Oct
    • M. Castro, P. Drushel, A. Kermarec, and A. Rowstrom, "Scribe: A largescale and decentralized application-level multicast infrastructure, " IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1489-1499, Oct. 2004.
    • (2004) IEEE J. Sel. Areas Commun. , vol.20 , Issue.8 , pp. 1489-1499
    • Castro, M.1    Drushel, P.2    Kermarec, A.3    Rowstrom, A.4
  • 44
    • 57849131733 scopus 로고    scopus 로고
    • A comparative study of the performance and security issues of aes and rsa cryptography
    • Nov
    • A. A. Hasib and A. Haque, "A comparative study of the performance and security issues of aes and rsa cryptography, " in Proc. 3rd Int. Conf. Convergence Hybrid Inf. Technol., Nov. 2008, vol. 2, pp. 505-510.
    • (2008) Proc. 3rd Int. Conf. Convergence Hybrid Inf. Technol. , vol.2 , pp. 505-510
    • Hasib, A.A.1    Haque, A.2
  • 45
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Apr
    • S. Goldwasser and S. Micali, "Probabilistic encryption, " J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, Apr. 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 46
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. 17th Int. Conf. Theory Appl. Cryptogr. Tech., 1999, pp. 223-238.
    • (1999) Proc. 17th Int. Conf. Theory Appl. Cryptogr. Tech , pp. 223-238
    • Paillier, P.1
  • 47
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • Jan
    • C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists, " EURASIP J. Inf. Security, vol. 2007, no. 1, pp. 013801:1-013801:15, Jan. 2007.
    • (2007) EURASIP J. Inf. Security , vol.2007 , Issue.1 , pp. 0138011-01380115
    • Fontaine, C.1    Galand, F.2
  • 48
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Berlin, Germany: Springer-Verlag
    • A. Shamir, "Identity-based cryptosystems and signature schemes, " in Advances in Cryptology, Lecture Notes in Computer Science, vol. 196. Berlin, Germany: Springer-Verlag, 1985, pp. 47-53.
    • (1985) Advances in Cryptology, Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 49
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairingbased cryptosystems
    • Lecture Notes in Computer Science
    • P. Barreto, H.Kim, B.Lynn, andM. Scott, "Efficient algorithms for pairingbased cryptosystems, " in Proc. 22ndAnnu. Int.Cryptol.Conf.Adv.Cryptol., vol. 2442, Lecture Notes in Computer Science, 2002, pp. 354-369.
    • (2002) Proc. 22ndAnnu. Int.Cryptol.Conf.Adv.Cryptol. , vol.2442 , pp. 354-369
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 50
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • Lecture Notes in Computer Science
    • F. Zhang, R. Safavi-Naini, andW. Susilo, "An efficient signature scheme from bilinear pairings and its applications, " in Proc. PKC, vol. 2947, Lecture Notes in Computer Science, 2004, pp. 277-290.
    • (2004) Proc. PKC , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 53
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • May/Jun
    • C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. 41st ACM Symp. Theory Comput., May/Jun. 2009, pp. 169-178.
    • (2009) Proc. 41st ACM Symp. Theory Comput. , pp. 169-178
    • Gentry, C.1
  • 57
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 58
    • 85024261619 scopus 로고    scopus 로고
    • Signature schemes based on the strong RSA assumption
    • Aug
    • R. Cramer and V. Shoup, "Signature schemes based on the strong RSA assumption, " ACM Trans. Inf. Syst. Security, vol. 3, no. 3, pp. 161-185, Aug. 2000.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.3 , pp. 161-185
    • Cramer, R.1    Shoup, V.2
  • 59
    • 0000534667 scopus 로고
    • Apublic key cryptosystem and a signature scheme based on discrete logarithms
    • T. E. Gamal, "Apublic key cryptosystem and a signature scheme based on discrete logarithms, " in Proc.CRYPTO84Adv.Cryptol., 1985, pp. 10-18.
    • (1985) Proc.CRYPTO84Adv.Cryptol , pp. 10-18
    • Gamal, T.E.1
  • 61
    • 0002474948 scopus 로고    scopus 로고
    • Performance comparison of public-key cryptosystems
    • M. J. Wiener, "Performance comparison of public-key cryptosystems, " RSA Crypto Bytes, vol. 4, no. 1, pp. 1-5, 1998.
    • (1998) RSA Crypto Bytes , vol.4 , Issue.1 , pp. 1-5
    • Wiener, M.J.1
  • 62
    • 0001263548 scopus 로고
    • A certified digital signature
    • R. Merkle, "A certified digital signature, " in Proc. Adv. Cryptol., 1989, pp. 218-238.
    • (1989) Proc. Adv. Cryptol , pp. 218-238
    • Merkle, R.1
  • 63
    • 52949130277 scopus 로고    scopus 로고
    • Fast hash-based signatures on constrained devices
    • Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
    • S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, and C. Paar, "Fast hash-based signatures on constrained devices, " in Smart Card Research and Advanced Applications, vol. 5189, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2008, pp. 104-117.
    • (2008) Smart Card Research and Advanced Applications , vol.5189 , pp. 104-117
    • Rohde, S.1    Eisenbarth, T.2    Dahmen, E.3    Buchmann, J.4    Paar, C.5
  • 67
    • 84929589233 scopus 로고    scopus 로고
    • [Online]. Available: http://www.is.titech.ac.jp/research/research-report/C/C-215.pdf
  • 68
    • 84929589234 scopus 로고
    • Digital signature schemes for computer communication networks
    • Oct
    • H. Meijer and S. Akl, "Digital signature schemes for computer communication networks, " ACM SIGCOMM Comput. Commun. Rev., vol. 11, no. 4, pp. 37-41, Oct. 1981.
    • (1981) ACM SIGCOMM Comput. Commun. Rev. , vol.11 , Issue.4 , pp. 37-41
    • Meijer, H.1    Akl, S.2
  • 70
    • 0023400323 scopus 로고
    • Clock synchronization in distributed real-time systems
    • Aug
    • H. Kopetz and W. Ochsenreiter, "Clock synchronization in distributed real-time systems, " IEEE Trans. Comput., vol. C-36, no. 8, pp. 933-940, Aug. 1987.
    • (1987) IEEE Trans. Comput. , vol.C-36 , Issue.8 , pp. 933-940
    • Kopetz, H.1    Ochsenreiter, W.2
  • 71
    • 77950627282 scopus 로고    scopus 로고
    • Coupling-based internal clock synchronization for large-scale dynamic distributed systems
    • May
    • R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, and S. Piergiovanni, "Coupling-based internal clock synchronization for large-scale dynamic distributed systems, " IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 5, pp. 607-619, May 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.5 , pp. 607-619
    • Baldoni, R.1    Corsaro, A.2    Querzoni, L.3    Scipioni, S.4    Piergiovanni, S.5
  • 72
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of fair nonrepudiation protocols
    • Nov
    • S. Kremer, O.Markowitch, and J. Zhou, "An intensive survey of fair nonrepudiation protocols, " Comput. Commun., vol. 25, no. 17, pp. 1606- 1621, Nov. 2002.
    • (2002) Comput. Commun. , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 73
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • Jan
    • M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts, " IEICE Trans. Fundam. Electron., Commun. Comput. Sci., vol. 80, no. 1, pp. 54-63, Jan. 1997.
    • (1997) IEICE Trans. Fundam. Electron., Commun. Comput. Sci. , vol.80 , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 74
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • Lecture Notes in Computer Science
    • M. Jakobsson, "On quorum controlled asymmetric proxy re-encryption, " in Proc. 2nd Int. Workshop Pract. Theory Public Key Cryptogr., vol. 1560, Lecture Notes in Computer Science, 1999, pp. 112-121.
    • (1999) Proc. 2nd Int. Workshop Pract. Theory Public Key Cryptogr. , vol.1560 , pp. 112-121
    • Jakobsson, M.1
  • 75
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Security , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 77
    • 84877578836 scopus 로고    scopus 로고
    • A survey on identity management for the future network
    • J. Torres, M. Nogueira, and G. Pujolle, "A survey on identity management for the future network, " IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 787-802, 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.2 , pp. 787-802
    • Torres, J.1    Nogueira, M.2    Pujolle, G.3
  • 78
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and Authorization Infrastructures (aais): A comparative survey
    • Oct
    • J. Lopez, R. Oppliger, and G. Pernul, "Authentication and Authorization Infrastructures (aais): A comparative survey, " Comput. Security, vol. 23, no. 7, pp. 578-590, Oct. 2004.
    • (2004) Comput. Security , vol.23 , Issue.7 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 87
    • 78649923058 scopus 로고    scopus 로고
    • A formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints
    • S. Bistarelli, F. Martinelli, and F. Santini, "A formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints, " in Proc. 7th Int. Conf. Auton. Trusted Comput., 2010, pp. 268-282.
    • (2010) Proc. 7th Int. Conf. Auton. Trusted Comput. , pp. 268-282
    • Bistarelli, S.1    Martinelli, F.2    Santini, F.3
  • 88
    • 84929589235 scopus 로고    scopus 로고
    • Integrating the Healthcare Enterprise (IHE), Access Control, Accessed: Jul. 2013
    • Integrating the Healthcare Enterprise (IHE), Access Control, Accessed: Jul. 2013. [Online]. Available: http://www.ihe.net/Technical-Framework/upload/IHE-ITI-TF-WhitePaper-AccessControl-2009-09-28.pdf
  • 90
    • 3042632320 scopus 로고    scopus 로고
    • Epidemic information dissemination in distributed systems
    • May
    • P. T. Eugster, R. Guerraoui, A.-M. Kermarrec, and L. Massoulié, "Epidemic information dissemination in distributed systems, " IEEE Comput., vol. 37, no. 5, pp. 60-67, May 2004.
    • (2004) IEEE Comput. , vol.37 , Issue.5 , pp. 60-67
    • Eugster, P.T.1    Guerraoui, R.2    Kermarrec, A.-M.3    Massoulié, L.4
  • 93
    • 84929589236 scopus 로고    scopus 로고
    • Glossary of Key Information Security Terms, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Apr. 2006
    • Glossary of Key Information Security Terms, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Apr. 2006. [Online]. Available: http://csrc.nist.gov/publications/
  • 94
    • 84929581490 scopus 로고    scopus 로고
    • Fort Meade, MD, USA, Apr.
    • National Information Assurance Glossary, Committee on National Security Systems, Fort Meade, MD, USA, Apr. 2010. [Online]. Available: http://www.cnss.gov/Assets/pdf/cnssi-4009.pdf
    • (2010) Committee on National Security Systems
  • 99
    • 84874316113 scopus 로고    scopus 로고
    • Byzantine fault-tolerant publish/subscribe: A cloud computing infrastructure
    • C. Tiancheng and H. Meling, "Byzantine fault-tolerant publish/subscribe: A cloud computing infrastructure, " in Proc. 31st IEEE Symp. Rel. Distrib. Syst., 2012, pp. 454-456.
    • Proc. 31st IEEE Symp. Rel. Distrib. Syst. , vol.2012 , pp. 454-456
    • Tiancheng, C.1    Meling, H.2
  • 100
    • 33749404596 scopus 로고    scopus 로고
    • Thema: Byzantine-fault-tolerant middleware for web-service applications
    • M. Merideth et al., "Thema: Byzantine-fault-tolerant middleware for web-service applications, " in Proc. 24th IEEE Symp. Rel. Distrib. Syst., 2005, pp. 131-140.
    • (2005) Proc. 24th IEEE Symp. Rel. Distrib. Syst , pp. 131-140
    • Merideth, M.1
  • 101
  • 103
    • 0000921140 scopus 로고    scopus 로고
    • Evidence and non-repudiation
    • Jul
    • J. Zhou and D. Gollmann, "Evidence and non-repudiation, " J. Netw. Comput. Appl., vol. 20, no. 3, pp. 267-281, Jul. 1997.
    • (1997) J. Netw. Comput. Appl. , vol.20 , Issue.3 , pp. 267-281
    • Zhou, J.1    Gollmann, D.2
  • 104
    • 85008244429 scopus 로고
    • Freshness assurance of authentication protocols
    • Lecture Notes in Computer Science
    • K.-Y. Lam and D. Gollmann, "Freshness assurance of authentication protocols, " in Proc. Comput. Security-ESORICS, vol. 648, Lecture Notes in Computer Science, 1992, pp. 261-271.
    • (1992) Proc. Comput. Security-ESORICS , vol.648 , pp. 261-271
    • Lam, K.-Y.1    Gollmann, D.2
  • 105
    • 0010600006 scopus 로고    scopus 로고
    • On the validity of digital signatures
    • Apr
    • J. Zhou and R. Deng, "On the validity of digital signatures, " ACM SIGCOMM Comput. Commun. Rev., vol. 30, no. 2, pp. 29-34, Apr. 2000.
    • (2000) ACM SIGCOMM Comput. Commun. Rev. , vol.30 , Issue.2 , pp. 29-34
    • Zhou, J.1    Deng, R.2
  • 106
    • 0345092813 scopus 로고    scopus 로고
    • Legal recognition of digital signatures
    • Jul
    • L. Hollaar and A. Asay, "Legal recognition of digital signatures, " IEEE Micro, vol. 16, no. 3, pp. 44-45, Jul. 1996.
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 44-45
    • Hollaar, L.1    Asay, A.2
  • 107
    • 0003007594 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object localization and routing for large-scale peer-to-peer systems
    • Lecture Notes in Computer Science, Nov
    • A. Rowstrom and P. Drushel, "Pastry: Scalable, decentralized object localization and routing for large-scale peer-to-peer systems, " in Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms, vol. 2218, Lecture Notes in Computer Science, Nov. 2001, pp. 329-351.
    • (2001) Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms , vol.2218 , pp. 329-351
    • Rowstrom, A.1    Drushel, P.2
  • 108
    • 0036800721 scopus 로고    scopus 로고
    • Scalable secure group communication over ip multicast
    • Oct
    • S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over ip multicast, " IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1511-1527, Oct. 2002.
    • (2002) IEEE J. Sel. Areas Commun. , vol.20 , Issue.8 , pp. 1511-1527
    • Banerjee, S.1    Bhattacharjee, B.2
  • 109
    • 0030836908 scopus 로고    scopus 로고
    • Toward a more secure internet
    • Jan
    • R. Atkinson, "Toward a more secure internet, " IEEE Comput., vol. 30, no. 1, pp. 57-61, Jan. 1997.
    • (1997) IEEE Comput. , vol.30 , Issue.1 , pp. 57-61
    • Atkinson, R.1
  • 110
    • 79551699813 scopus 로고    scopus 로고
    • A survey of dht security techniques
    • Feb
    • G. Urdaneta, G. Pierre, and M. V. Steen, "A survey of dht security techniques, " ACM Comput. Surveys, vol. 43, no. 2, pp. 8:1-8:49, Feb. 2011.
    • (2011) ACM Comput. Surveys , vol.43 , Issue.2 , pp. 81-849
    • Urdaneta, G.1    Pierre, G.2    Steen, M.V.3
  • 113
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: A survey
    • Jan./Feb
    • P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey, " IEEE Netw., vol. 17, no. 1, pp. 30-36, Jan./Feb. 2003.
    • (2003) IEEE Netw. , vol.17 , Issue.1 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 114
    • 85084164565 scopus 로고    scopus 로고
    • Secure distribution of events in contentbased publish subscribe systems
    • Aug
    • L. Opyrchal and A. Prakash, "Secure distribution of events in contentbased publish subscribe systems, " in Proc. 10th USENIX Security Symp., Aug. 2001, pp. 1-16.
    • (2001) Proc. 10th USENIX Security Symp. , pp. 1-16
    • Opyrchal, L.1    Prakash, A.2
  • 115
    • 84994275465 scopus 로고    scopus 로고
    • Towards an access control mechanism for wide-area publish/subscribe systems
    • Z. Miklos, "Towards an access control mechanism for wide-area publish/subscribe systems, " in Proc. 22nd Int. Conf. Distrib. Comput. Syst. Workshops, 2002, pp. 516-521.
    • (2002) Proc. 22nd Int. Conf. Distrib. Comput. Syst. Workshops , pp. 516-521
    • Miklos, Z.1
  • 116
    • 1642279591 scopus 로고    scopus 로고
    • Implementing a prototype of the security framework for distributed brokering systems
    • Y. Yan et al., "Implementing a prototype of the security framework for distributed brokering systems, " in Proc. Int. Conf. Security Manage., 2003, pp. 212-218.
    • (2003) Proc. Int. Conf. Security Manage , pp. 212-218
    • Yan, Y.1
  • 117
    • 33746099222 scopus 로고    scopus 로고
    • Naradabrokering: A distributed middleware framework and architecture for enabling durable peer-to-peer grids
    • S. Pallickara and G. Fox, "Naradabrokering: A distributed middleware framework and architecture for enabling durable peer-to-peer grids, " in Proc. ACM/IFIP/USENIX Int. Conf. Middleware, 2003, pp. 41-61.
    • (2003) Proc. ACM/IFIP/USENIX Int. Conf. Middleware , pp. 41-61
    • Pallickara, S.1    Fox, G.2
  • 118
    • 46149104789 scopus 로고    scopus 로고
    • A framework for secure end-to-end delivery of messages in publish/subscribe systems
    • S. Pallickara et al., "A framework for secure end-to-end delivery of messages in publish/subscribe systems, " in Proc. 7th IEEE/ACM Int. Conf. Grid Comput., 2006, pp. 215-222.
    • (2006) Proc. 7th IEEE/ACM Int. Conf. Grid Comput , pp. 215-222
    • Pallickara, S.1
  • 121
    • 33749374771 scopus 로고    scopus 로고
    • A capability-based access control architecture for multi-domain publish/subscribe systems
    • L. Pesonen, D. Eyers, and J. Bacon, "A capability-based access control architecture for multi-domain publish/subscribe systems, " in Proc. Int. Symp. Appl. Internet, 2007, pp. 222-228.
    • (2007) Proc. Int. Symp. Appl. Internet , pp. 222-228
    • Pesonen, L.1    Eyers, D.2    Bacon, J.3
  • 122
    • 36549013845 scopus 로고    scopus 로고
    • Access control in decentralised publish/subscribe systems
    • Apr
    • L. Pesonen, D. Eyers, and J. Bacon, "Access control in decentralised publish/subscribe systems, " J. Netw., vol. 2, no. 2, pp. 57-67, Apr. 2006.
    • (2006) J. Netw. , vol.2 , Issue.2 , pp. 57-67
    • Pesonen, L.1    Eyers, D.2    Bacon, J.3
  • 123
    • 79953825568 scopus 로고    scopus 로고
    • Security policy and information sharing in distributed event-based systems
    • Berlin, Germany: Springer-Verlag
    • B. Shand et al., "Security policy and information sharing in distributed event-based systems, " in Reasoning in Event-Based Distributed Systems, vol. 347. Berlin, Germany: Springer-Verlag, 2011, pp. 151-172.
    • (2011) Reasoning in Event-Based Distributed Systems , vol.347 , pp. 151-172
    • Shand, B.1
  • 126
    • 33644536683 scopus 로고    scopus 로고
    • Scalable security and accounting services for contentbased publish/subscribe systems
    • H. Khurana, "Scalable security and accounting services for contentbased publish/subscribe systems, " in Proc. ACM Symp. Appl. Comput., 2005, pp. 801-807.
    • (2005) Proc. ACM Symp. Appl. Comput , pp. 801-807
    • Khurana, H.1
  • 127
    • 50049089599 scopus 로고    scopus 로고
    • Enabling confidentiality in contentbased publish/subscribe infrastructures
    • C. Raiciu and D. Rosenblum, "Enabling confidentiality in contentbased publish/subscribe infrastructures, " in Proc. Securecomm Workshops, 2006, pp. 1-11.
    • (2006) Proc. Securecomm Workshops , pp. 1-11
    • Raiciu, C.1    Rosenblum, D.2
  • 128
    • 33947668891 scopus 로고    scopus 로고
    • Dynamic access control in a content-based publish/subscribe system with delivery guarantees
    • Y. Zhao and D. Sturman, "Dynamic access control in a content-based publish/subscribe system with delivery guarantees, " in Proc. 26th IEEE Int. Conf. Distrib. Comput. Syst., 2006, pp. 1-8.
    • (2006) Proc. 26th IEEE Int. Conf. Distrib. Comput. Syst , pp. 1-8
    • Zhao, Y.1    Sturman, D.2
  • 129
    • 33947510802 scopus 로고    scopus 로고
    • Gryphon: An information flow based approach to message brokering
    • Paderborn, Germany
    • R. Strom et al., "Gryphon: An information flow based approach to message brokering, " in Proc. Int. Symp. Softw. Rel. Eng., Paderborn, Germany, 1998, pp. 1-2.
    • (1998) Proc. Int. Symp. Softw. Rel. Eng. , pp. 1-2
    • Strom, R.1
  • 130
    • 31044454785 scopus 로고    scopus 로고
    • A security framework for contentbased publish-subscribe system
    • Jul
    • G. Padmavathi and S. Annadurai, "A security framework for contentbased publish-subscribe system, " J. Electron. Commerce Res. Appl., vol. 5, no. 1, pp. 78-90, Jul. 2006.
    • (2006) J. Electron. Commerce Res. Appl. , vol.5 , Issue.1 , pp. 78-90
    • Padmavathi, G.1    Annadurai, S.2
  • 131
    • 84868688003 scopus 로고    scopus 로고
    • Quip: A protocol for securing content in peer-to-peer publish/subscribe overlay networks
    • A. Corman, P. Schachte, and V. Teague, "Quip: A protocol for securing content in peer-to-peer publish/subscribe overlay networks, " in Proc. 30th Australasian Conf. Comput. Sci., 2007, vol. 62, pp. 35-40.
    • (2007) Proc. 30th Australasian Conf. Comput. Sci , vol.62 , pp. 35-40
    • Corman, A.1    Schachte, P.2    Teague, V.3
  • 133
    • 84863145281 scopus 로고    scopus 로고
    • Eventguard: A system architecture for securing publish-subscribe networks
    • Dec
    • M. Srivatsa, L. Liu, and A. Iyengar, "Eventguard: A system architecture for securing publish-subscribe networks, " ACM Trans. Comput. Syst., vol. 29, no. 4, pp. 10:1-10:40, Dec. 2011.
    • (2011) ACM Trans. Comput. Syst. , vol.29 , Issue.4 , pp. 101-1040
    • Srivatsa, M.1    Liu, L.2    Iyengar, A.3
  • 134
    • 70350786565 scopus 로고    scopus 로고
    • A security plane for publish/subscribe based content oriented networks
    • W. Wong, F. Verdi, and F. Magalhães, "A security plane for publish/subscribe based content oriented networks, " in Proc. ACM CoNEXT Conf., 2008, pp. 45:1-45:2.
    • (2008) Proc. ACM CoNEXT Conf , pp. 451-452
    • Wong, W.1    Verdi, F.2    Magalhães, F.3
  • 137
    • 78651101167 scopus 로고    scopus 로고
    • Towards a cryptographic treatment of publish/subscribe systems
    • Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
    • T.-H. Yuen, W. Susilo, and Y. Mu, "Towards a cryptographic treatment of publish/subscribe systems, " in Cryptology and Network Security, vol. 6467, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2010, pp. 201-220.
    • (2010) Cryptology and Network Security , vol.6467 , pp. 201-220
    • Yuen, T.-H.1    Susilo, W.2    Mu, Y.3
  • 138
    • 78049360046 scopus 로고    scopus 로고
    • A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
    • S. Choi, G. Ghinita, and E. Bertino, "A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations, " in Proc. 21st Int. Conf. Database Expert Syst. Appl. I, 2010, pp. 368-384.
    • (2010) Proc. 21st Int. Conf. Database Expert Syst. Appl. , vol.1 , pp. 368-384
    • Choi, S.1    Ghinita, G.2    Bertino, E.3
  • 139
    • 84859443849 scopus 로고    scopus 로고
    • Design and implementation of a confidentiality and access control solution for publish/subscribe systems
    • May
    • M. Ion, G. Russello, and B. Crispo, "Design and implementation of a confidentiality and access control solution for publish/subscribe systems, " Comput. Netw., vol. 56, no. 7, pp. 2014-2037, May 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.7 , pp. 2014-2037
    • Ion, M.1    Russello, G.2    Crispo, B.3
  • 141
    • 84883353658 scopus 로고    scopus 로고
    • Privacy preserving context aware publish subscribe systems
    • Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
    • M. Nabeel, S. Appel, E. Bertino, and A. Buchmann, "Privacy preserving context aware publish subscribe systems, " in Network and System Security, vol. 7873, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2013, pp. 465-478.
    • (2013) Network and System Security , vol.7873 , pp. 465-478
    • Nabeel, M.1    Appel, S.2    Bertino, E.3    Buchmann, A.4
  • 142
    • 84929580298 scopus 로고    scopus 로고
    • Identity management and integrity protection in publish-subscribe systems
    • Berlin, Germany: Springer-Verlag
    • A. Fongen and F. Mancini, "Identity management and integrity protection in publish-subscribe systems, " in Policies and Research in Identity Management, vol. 396. Berlin, Germany: Springer-Verlag, 2013, pp. 68-82.
    • (2013) Policies and Research in Identity Management , vol.396 , pp. 68-82
    • Fongen, A.1    Mancini, F.2
  • 143
    • 84891787641 scopus 로고    scopus 로고
    • Securing broker-less publish/subscribe systems using identity-based encryption
    • Feb
    • M. Tariq, B. Koldehofe, and K. Rothermel, "Securing broker-less publish/subscribe systems using identity-based encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 518-528, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.2 , pp. 518-528
    • Tariq, M.1    Koldehofe, B.2    Rothermel, K.3
  • 147
    • 84865788031 scopus 로고    scopus 로고
    • A model of oasis role-based access control and its support for active security
    • Nov
    • J. Bacon, K. Moody, and W. Yao, "A model of oasis role-based access control and its support for active security, " ACM Trans. Inf. Syst. Security, vol. 5, no. 4, pp. 492-540, Nov. 2002.
    • (2002) ACM Trans. Inf. Syst. Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 148
    • 84869403191 scopus 로고    scopus 로고
    • Architecture patterns for a ubiquitous identity management system
    • Jan.
    • A. Fongen, "Architecture patterns for a ubiquitous identity management system, " in Proc. 6th Int. Conf. Syst., Jan. 2011, pp. 66-71.
    • (2011) Proc. 6th Int. Conf. Syst. , pp. 66-71
    • Fongen, A.1
  • 149
    • 80053979754 scopus 로고    scopus 로고
    • A framework for authentication in nbd tactical ad hoc networks
    • Oct
    • A. Hegland, E.Winjum, and O.-E. Hedenstad, "A framework for authentication in nbd tactical ad hoc networks, " IEEE Commun. Mag., vol. 49, no. 10, pp. 64-71, Oct. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.10 , pp. 64-71
    • Hegland, A.1    Winjum, E.2    Hedenstad, O.-E.3
  • 150
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Sep
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication, " ACM Comput. Surveys, vol. 35, no. 3, pp. 309- 329, Sep. 2003.
    • (2003) ACM Comput. Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 153
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Oct
    • S. Mittra, "Iolus: A framework for scalable secure multicasting, " SIGCOMMComputCommun.Rev., vol. 27, no. 4, pp. 277-288, Oct. 1997.
    • (1997) SIGCOMMComputCommun.Rev. , vol.27 , Issue.4 , pp. 277-288
    • Mittra, S.1
  • 154
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs, " IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16- 30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Netw. , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.G.2    Lam, S.S.3
  • 155
    • 84937411419 scopus 로고    scopus 로고
    • A public-key traitor tracing scheme with revocation using dynamic shares
    • Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
    • W.-G. Tzeng and Z.-J. Tzeng, "A public-key traitor tracing scheme with revocation using dynamic shares, " in Public Key Cryptography, vol. 1992, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2001, pp. 207-224.
    • (2001) Public Key Cryptography , vol.1992 , pp. 207-224
    • Tzeng, W.-G.1    Tzeng, Z.-J.2
  • 156
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • Lecture Notes in Computer Science
    • J. Baek, R. Safavi-Naini, andW. Susilo, "Public key encryption with keyword search revisited, " in Proc. Int. Conf. Comput. Sci. Appl., vol. 5072, Lecture Notes in Computer Science, 2008, pp. 1249-1259.
    • (2008) Proc. Int. Conf. Comput. Sci. Appl. , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 160
    • 84857214330 scopus 로고    scopus 로고
    • Forbid: Cope with byzantine behaviors in wireless multi-path routing and forwarding
    • X. Su, G. Peng, and S. Chan, "Forbid: Cope with byzantine behaviors in wireless multi-path routing and forwarding, " in Proc. IEEE Global Telecommun. Conf., 2011, pp. 1-6.
    • (2011) Proc. IEEE Global Telecommun. Conf. , pp. 1-6
    • Su, X.1    Peng, G.2    Chan, S.3
  • 162
    • 84944073206 scopus 로고    scopus 로고
    • Monitoring, security, dynamic configuration with the dynamic TAO reflective ORB
    • F. Kon et al., "Monitoring, security, dynamic configuration with the dynamic TAO reflective ORB, " in Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms, 2000, pp. 121-143.
    • (2000) Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms , pp. 121-143
    • Kon, F.1
  • 163
    • 0033489645 scopus 로고    scopus 로고
    • Optimistic security: A new access control paradigm
    • D. Povey, "Optimistic security: A new access control paradigm, " in Proc. Workshop New Security Paradigms, 2000, pp. 40-45.
    • (2000) Proc. Workshop New Security Paradigms , pp. 40-45
    • Povey, D.1
  • 164
    • 33846576210 scopus 로고    scopus 로고
    • Audit-based access control for electronic health records
    • Feb
    • M. Dekker and S. Etalle, "Audit-based access control for electronic health records, " Electron. Notes Theor. Comput. Sci., vol. 168, pp. 221- 236, Feb. 2007.
    • (2007) Electron. Notes Theor. Comput. Sci. , vol.168 , pp. 221-236
    • Dekker, M.1    Etalle, S.2
  • 169
    • 84929589238 scopus 로고    scopus 로고
    • 42 CFR Part 59-Attachment B, U.S. Department of Health and Human Services, Washington, DC, USA, 2000, Accessed: Jan. 2014
    • 42 CFR Part 59-Attachment B, U.S. Department of Health and Human Services, Washington, DC, USA, 2000, Accessed: Jan. 2014. [Online]. Available: http://www.hhs.gov/opa/title-x-family-planning/title-x-policies/program-guidelines/
  • 170
    • 0033314753 scopus 로고    scopus 로고
    • An overview of PKI trust models
    • Nov
    • R. Perlman, "An overview of PKI trust models, " IEEE Netw., vol. 13, no. 6, pp. 38-43, Nov. 1999.
    • (1999) IEEE Netw. , vol.13 , Issue.6 , pp. 38-43
    • Perlman, R.1
  • 172
    • 33645989774 scopus 로고    scopus 로고
    • Distributed collaborative key agreement and authentication protocols for dynamic peer groups
    • Apr
    • P. Lee, J.-S. Lui, and D. Yau, "Distributed collaborative key agreement and authentication protocols for dynamic peer groups, " IEEE/ACM Trans. Netw., vol. 14, no. 2, pp. 263-276, Apr. 2006.
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , Issue.2 , pp. 263-276
    • Lee, P.1    Lui, J.-S.2    Yau, D.3
  • 173
    • 59649129992 scopus 로고    scopus 로고
    • Approximately optimal trees for group key management with batch updates
    • Mar
    • M. Li, Z. Feng, N. Zang, R. Graham, and F. Yao, "Approximately optimal trees for group key management with batch updates, " Theor. Comput. Sci., vol. 410, no. 11, pp. 1013-1021, Mar. 2009.
    • (2009) Theor. Comput. Sci. , vol.410 , Issue.11 , pp. 1013-1021
    • Li, M.1    Feng, Z.2    Zang, N.3    Graham, R.4    Yao, F.5
  • 175
    • 0347946946 scopus 로고    scopus 로고
    • Protocol design for scalable and reliable group rekeying
    • Dec
    • X. Zhang, S. Lam, D.-Y. Lee, and Y. Yang, "Protocol design for scalable and reliable group rekeying, " IEEE/ACM Trans. Netw., vol. 11, no. 6, pp. 908-922, Dec. 2003.
    • (2003) IEEE/ACM Trans. Netw. , vol.11 , Issue.6 , pp. 908-922
    • Zhang, X.1    Lam, S.2    Lee, D.-Y.3    Yang, Y.4
  • 176
    • 35048839833 scopus 로고    scopus 로고
    • Randomness extraction and key derivation using the CBC, cascade and HMAC modes
    • Lecture Notes in Computer Science
    • Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin, "Randomness extraction and key derivation using the CBC, cascade and HMAC modes, " in Proc. Adv. CRYPTO, vol. 3152, Lecture Notes in Computer Science, 2004, pp. 494-510.
    • (2004) Proc. Adv. CRYPTO , vol.3152 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 177
    • 34848843875 scopus 로고    scopus 로고
    • A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    • Dec
    • A. Pour, K. Kumekawa, T. Kato, and S. Itoh, "A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation, " Comput. Netw., vol. 51, no. 17, pp. 4727-4743, Dec. 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.17 , pp. 4727-4743
    • Pour, A.1    Kumekawa, K.2    Kato, T.3    Itoh, S.4
  • 178
    • 54349088694 scopus 로고    scopus 로고
    • Secure and efficient group key management with shared key derivation
    • Jan
    • J.-C. Lin, K.-H. Huang, F. Lai, and H.-C. Lee, "Secure and efficient group key management with shared key derivation, " Comput. Std. Interfaces, vol. 31, no. 1, pp. 192-208, Jan. 2009.
    • (2009) Comput. Std. Interfaces , vol.31 , Issue.1 , pp. 192-208
    • Lin, J.-C.1    Huang, K.-H.2    Lai, F.3    Lee, H.-C.4
  • 180
    • 84877577710 scopus 로고    scopus 로고
    • A survey of group key distribution schemes with self-healing property
    • T. Rams and P. Pacyna, "A survey of group key distribution schemes with self-healing property, " IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 820-842, 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.2 , pp. 820-842
    • Rams, T.1    Pacyna, P.2
  • 181
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Lecture Notes in Computer Science
    • S. Al-Riyami and K. Paterson, "Certificateless public key cryptography, " in Proc. Adv. ASIACRYPT, vol. 2894, Lecture Notes in Computer Science, 2003, pp. 452-473.
    • (2003) Proc. Adv. ASIACRYPT , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 182
    • 84859548489 scopus 로고    scopus 로고
    • Strongly secure certificateless short signatures
    • Jun
    • R. Tso, X. Huang, and W. Susilo, "Strongly secure certificateless short signatures, " J. Syst. Softw., vol. 85, no. 6, pp. 1409-1417, Jun. 2012.
    • (2012) J. Syst. Softw. , vol.85 , Issue.6 , pp. 1409-1417
    • Tso, R.1    Huang, X.2    Susilo, W.3
  • 183
    • 84857368369 scopus 로고    scopus 로고
    • An efficient RSA-based certificateless signature scheme
    • Mar
    • J. Zhang and J. Mao, "An efficient RSA-based certificateless signature scheme, " J. Syst. Softw., vol. 85, no. 3, pp. 638-642, Mar. 2012.
    • (2012) J. Syst. Softw. , vol.85 , Issue.3 , pp. 638-642
    • Zhang, J.1    Mao, J.2
  • 184
    • 85024290278 scopus 로고
    • Group signatures
    • Lecture Notes in Computer Science
    • D. Chaum and E. Heyst, "Group signatures, " in Proc. Adv. EUROCRYPT, vol. 547, Lecture Notes in Computer Science, 1991, pp. 257-265.
    • (1991) Proc. Adv. EUROCRYPT , vol.547 , pp. 257-265
    • Chaum, D.1    Heyst, E.2
  • 185
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Lecture Notes in Computer Science
    • J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials, " in Proc. Adv. CRYPTO, vol. 2442, Lecture Notes in Computer Science, 2002, pp. 61-76.
    • (2002) Proc. Adv. CRYPTO , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 186
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Lecture Notes in Computer Science
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures, " in Proc. Adv. CRYPTO, vol. 3152, Lecture Notes in Computer Science, 2004, pp. 41-55.
    • (2004) Proc. Adv. CRYPTO , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 187
    • 33845604652 scopus 로고    scopus 로고
    • Group signatures with reduced bandwidth
    • Dec
    • S. Zhou and D. Lin, "Group signatures with reduced bandwidth, " Proc. Inst. Elect. Eng.-Inf. Security, vol. 153, no. 4, pp. 146-152, Dec. 2006.
    • (2006) Proc. Inst. Elect. Eng.-Inf. Security , vol.153 , Issue.4 , pp. 146-152
    • Zhou, S.1    Lin, D.2
  • 188
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Lecture Notes in Computer Science
    • R. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret, " in Proc. Adv. ASIACRYPT, vol. 2248, Lecture Notes in Computer Science, 2001, pp. 552-565.
    • (2001) Proc. Adv. ASIACRYPT , vol.2248 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 190
    • 64749109626 scopus 로고    scopus 로고
    • An efficient id-based proxy ring signature scheme
    • Jan
    • W. Lei and L. Daxing, "An efficient id-based proxy ring signature scheme, " in Proc. WRI Int. Conf. Commun. Mobile Comput., Jan. 2009, vol. 3, pp. 560-563.
    • (2009) Proc. WRI Int. Conf. Commun. Mobile Comput. , vol.3 , pp. 560-563
    • Lei, W.1    Daxing, L.2
  • 191
  • 192
    • 62749138415 scopus 로고    scopus 로고
    • Optimization based rate control for multicast with network coding: A multipath formulation
    • Dec
    • T. Cui, L. Chen, and T. Ho, "Optimization based rate control for multicast with network coding: A multipath formulation, " in Proc. 46th IEEE Conf. Decision Control, Dec. 2007, pp. 6041-6046.
    • (2007) Proc. 46th IEEE Conf. Decision Control , pp. 6041-6046
    • Cui, T.1    Chen, L.2    Ho, T.3
  • 193
    • 79956125472 scopus 로고    scopus 로고
    • Network coding based reliable disjoint and braided multipath routing for sensor networks
    • Jul
    • Y. Yang, C. Zhong, Y. Sun, and J. Yang, "Network coding based reliable disjoint and braided multipath routing for sensor networks, " J. Netw. Comput. Appl., vol. 33, no. 4, pp. 422-432, Jul. 2010.
    • (2010) J. Netw. Comput. Appl. , vol.33 , Issue.4 , pp. 422-432
    • Yang, Y.1    Zhong, C.2    Sun, Y.3    Yang, J.4
  • 196
    • 0026869241 scopus 로고
    • Analysis and modeling of correlated failures in multicomputer systems
    • May
    • D. Tang and R. Iyer, "Analysis and modeling of correlated failures in multicomputer systems, " IEEE Trans. Comput., vol. 41, no. 5, pp. 567- 577, May 1992.
    • (1992) IEEE Trans. Comput. , vol.41 , Issue.5 , pp. 567-577
    • Tang, D.1    Iyer, R.2
  • 201
    • 84884306650 scopus 로고    scopus 로고
    • Middleware for security and safety critical systems
    • May
    • G. Uchenick, "Middleware for security and safety critical systems, " in Proc. Embedded Syst. Europe, May 2006, pp. 24-26.
    • (2006) Proc. Embedded Syst. Europe , pp. 24-26
    • Uchenick, G.1
  • 204
    • 84929589239 scopus 로고    scopus 로고
    • OMG, CORBA Security Specifications. Accessed: December 2012
    • OMG, CORBA Security Specifications. Accessed: December 2012. [Online]. Available: www.omg.org/
  • 207
    • 84929589240 scopus 로고    scopus 로고
    • OMG, DDS Interoperability Protocol (DDSI), Needham, MA, USA Accessed: Sep.
    • OMG, DDS Interoperability Protocol (DDSI), Needham, MA, USA, Accessed: Sep. 2012. [Online]. Available: www.omg.org
    • (2012)
  • 208
    • 79955757995 scopus 로고    scopus 로고
    • The design and implementation of datagram TLS
    • San Diego, CA, USA, Feb
    • N. Modadugu and E. Rescorla, "The design and implementation of datagram TLS, " in Proc. Netw. Distrib. Syst. Security Symp., San Diego, CA, USA, Feb. 2004, pp. 1-7.
    • (2004) Proc. Netw. Distrib. Syst. Security Symp. , pp. 1-7
    • Modadugu, N.1    Rescorla, E.2
  • 210
    • 84868111872 scopus 로고    scopus 로고
    • XML and web services security standards
    • Apr
    • N. A. Nordbotten, "XML and web services security standards, " IEEE Commun. Surveys Tuts., vol. 36, no. 4, pp. 96-98, Apr. 2003.
    • (2003) IEEE Commun. Surveys Tuts. , vol.36 , Issue.4 , pp. 96-98
    • Nordbotten, N.A.1
  • 211
    • 84868153414 scopus 로고    scopus 로고
    • Standards for XML and web services security
    • M. Naedele, "Standards for XML and web services security, " IEEE Comput. Mag., vol. 11, no. 3, pp. 4-21, 2009.
    • (2009) IEEE Comput. Mag. , vol.11 , Issue.3 , pp. 4-21
    • Naedele, M.1
  • 215
    • 0036711886 scopus 로고    scopus 로고
    • An overview of standards and related technology in web services
    • Sep./Nov
    • A. Tsalgatidou and T. Pilioura, "An overview of standards and related technology in web services, " Distrib. Parallel Databases, vol. 12, no. 1/2, pp. 135-162, Sep./Nov. 2002.
    • (2002) Distrib. Parallel Databases , vol.12 , Issue.1-2 , pp. 135-162
    • Tsalgatidou, A.1    Pilioura, T.2
  • 216
    • 67650790156 scopus 로고    scopus 로고
    • Logging in the age of web services
    • Jun
    • A. Chuvakin and G. Peterson, "Logging in the age of web services, " IEEE Security Privacy, vol. 7, no. 3, pp. 82-85, Jun. 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.3 , pp. 82-85
    • Chuvakin, A.1    Peterson, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.