-
2
-
-
33750918111
-
-
Research Report RC23103. IBM
-
Mark Astley, Joshua Auerbach, Sumeer Bhola, Gerard Buttner, Marc Kaplan, Kevan Miller, Robert Saccone Jr., Robert Strom, Daniel C. Sturman, Michael J.Ward, and Yuanyuan Zhao. 2004. Achieving Scalability and Throughput in a Publish/Subscribe System. Research Report RC23103. IBM.
-
(2004)
Achieving Scalability and Throughput in A Publish/Subscribe System
-
-
Astley, M.1
Auerbach, J.2
Bhola, S.3
Buttner, G.4
Kaplan, M.5
Miller, K.6
Saccone, R.7
Strom, R.8
Sturman, D.C.9
Ward, M.J.10
Zhao, Y.11
-
4
-
-
79953820974
-
Security in multi-domain event-based systems
-
Jean Bacon, David Eyers, Jatinder Singh, Brian Shand, Matteo Migliavacca, and Peter Pietzuch. 2010.Security in multi-domain event-based systems. IT 51, 5, 277-284.
-
(2010)
IT
, vol.51
, Issue.5
, pp. 277-284
-
-
Bacon, J.1
Eyers, D.2
Singh, J.3
Shand, B.4
Migliavacca, M.5
Pietzuch, P.6
-
6
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Jean Bacon, Ken Moody, and Walt Yao. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security 5, 4, 492-540. DOI:http://dx.doi.org/10.1145/581271.581276
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
7
-
-
84864276279
-
Distributed event routing in publish/subscribe systems
-
B. Garbinato, H. Miranda, and L. Rodrigues (Eds.) Springer, Berlin
-
Roberto Baldoni, Leonardo Querzoni, Sasu Tarkoma, and Antonino Virgillito. 2009. Distributed event routing in publish/subscribe systems. In Middleware for Network Eccentric and Mobile Applications, B. Garbinato, H. Miranda, and L. Rodrigues (Eds.). Springer, Berlin, 219-244. DOI:http://dx.doi.org/10.1007/978-3-540-89707-1-10
-
(2009)
Middleware for Network Eccentric and Mobile Applications
, pp. 219-244
-
-
Baldoni, R.1
Querzoni, L.2
Tarkoma, S.3
Virgillito, A.4
-
8
-
-
85032612971
-
Efficient and confidentiality-preserving content-based publish/subscribe with prefiltering
-
Raphaël Barazzutti, Pascal Felber, Hugues Mercier, Emanuel Onica, and Etienne Rivière. 2015. Efficient and confidentiality-preserving content-based publish/subscribe with prefiltering. IEEE Transactions on Dependable and Secure Computing PP, 99, 1.
-
(2015)
IEEE Transactions on Dependable and Secure Computing PP
, vol.99
, pp. 1
-
-
Barazzutti, R.1
Felber, P.2
Mercier, H.3
Onica, E.4
Rivière, E.5
-
9
-
-
84907766496
-
Elastic scaling of a high-throughput content-based publish/subscribe engine
-
Raphaël Barazzutti, Thomas Heinze, AndréMartin, Emanuel Onica, Pascal Felber, Christof Fetzer, Zbigniew Jerzak, Marcelo Pasin, and Etienne Rivière. 2014. Elastic scaling of a high-throughput content-based publish/subscribe engine. In Proceedings of the 34th International Conference on Distributed Computing Systems (ICDCS'14).
-
(2014)
Proceedings of the 34th International Conference on Distributed Computing Systems (ICDCS'14)
-
-
Barazzutti, R.1
Heinze, T.2
Emanuel Onica, A.3
Felber, P.4
Fetzer, C.5
Jerzak, Z.6
Pasin, M.7
Rivière, E.8
-
10
-
-
84881148912
-
StreamHub: A massively parallel architecture for highperformance content-based publish/subscribe
-
Raphaël P. Barazzutti, Pascal Felber, Christof Fetzer, Emanuel Onica, Marcelo Pasin, Jean-François Pineau, Etienne Rivière, and Stefan Weigert. 2013. StreamHub: A massively parallel architecture for highperformance content-based publish/subscribe. In Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems (DEBS'13).
-
(2013)
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems (DEBS'13)
-
-
Barazzutti, R.P.1
Felber, P.2
Fetzer, C.3
Onica, E.4
Pasin, M.5
Pineau, J.-F.6
Rivière, E.7
Weigert, S.8
-
13
-
-
84869382999
-
Foundations of garbled circuits
-
ACM, New York, NY
-
Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. 2012. Foundations of garbled circuits. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS'12). ACM, New York, NY, 784-796.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS'12)
, pp. 784-796
-
-
Bellare, M.1
Tung Hoang, V.2
Rogaway, P.3
-
16
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
Elisa Bertino and Elena Ferrari. 2002. Secure and selective dissemination of XML documents. ACM Transactions on Information and System Security 5, 3, 290-331. DOI:http://dx.doi.org/10.1145/545186.545190
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
22
-
-
33644905483
-
Network applications of Bloom filters: A survey
-
Andrei Broder, Michael Mitzenmacher, and Andrei Broder. 2002. Network applications of Bloom filters: A survey. Internet Mathematics 1, 4, 636-646.
-
(2002)
Internet Mathematics
, vol.1
, Issue.4
, pp. 636-646
-
-
Broder, A.1
Mitzenmacher, M.2
Broder, A.3
-
23
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
Antonio Carzaniga, David S. Rosenblum, and Alexander L. Wolf. 2001. Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems 19, 3, 332-383.
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
24
-
-
0036802048
-
Scribe: A large-scale and decentralized application-level multicast infrastructure
-
Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony Rowstron. 2002. Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communication 20, 8, 1489-1499.
-
(2002)
IEEE Journal on Selected Areas in Communication
, vol.20
, Issue.8
, pp. 1489-1499
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.-M.3
Rowstron, A.4
-
26
-
-
84903186345
-
P2S: A fault-tolerant publish/subscribe infrastructure
-
ACM, New York, NY
-
Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang. 2014. P2S: A fault-tolerant publish/subscribe infrastructure. In Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems (DEBS'14). ACM, New York, NY, 189-197. DOI:http://dx.doi.org/10.1145/2611286.2611305
-
(2014)
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems (DEBS'14)
, pp. 189-197
-
-
Chang, T.1
Duan, S.2
Meling, H.3
Peisert, S.4
Zhang, H.5
-
28
-
-
78049360046
-
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
-
Springer
-
Sunoh Choi, Gabriel Ghinita, and Elisa Bertino. 2010.A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In Database and Expert Systems Applications. Lecture Notes in Computer Science, Vol. 6261. Springer, 368-384.
-
(2010)
Database and Expert Systems Applications. Lecture Notes in Computer Science
, vol.6261
, pp. 368-384
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
30
-
-
84978186414
-
Introducing reliability in content-based publish-subscribe through epidemic algorithms
-
ACM, New York, NY
-
Paolo Costa, Matteo Migliavacca, Gian Pietro Picco, and Gianpaolo Cugola. 2003. Introducing reliability in content-based publish-subscribe through epidemic algorithms. In Proceedings of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03). ACM, New York, NY, 1-8. DOI:http://dx.doi.org/10.1145/966618.966629
-
(2003)
Proceedings of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03)
, pp. 1-8
-
-
Costa, P.1
Migliavacca, M.2
Pietro Picco, G.3
Cugola, G.4
-
31
-
-
84883370369
-
Efficient and private three-party publish/subscribe
-
Giovanni Crescenzo, Jim Burns, Brian Coan, John Schultz, Jonathan Stanton, Simon Tsang, and Rebecca N. Wright. 2013. Efficient and private three-party publish/subscribe. In Proceedings of the 7th International Conference on Network and System Security (NSS'13). 278-292.
-
(2013)
Proceedings of the 7th International Conference on Network and System Security (NSS'13)
, pp. 278-292
-
-
Crescenzo, G.1
Burns, J.2
Coan, B.3
Schultz, J.4
Stanton, J.5
Tsang, S.6
Wright, R.N.7
-
32
-
-
0035440934
-
The JEDI event-based infrastructure and its application to the development of the OPSSWFMS
-
Gianpaolo Cugola, Elisabetta Di Nitto, and Alfonso Fuggetta. 2001. The JEDI event-based infrastructure and its application to the development of the OPSSWFMS. IEEE Transactions on Software Engineering 27, 9, 827-850. DOI:http://dx.doi.org/10.1109/32.950318
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.9
, pp. 827-850
-
-
Cugola, G.1
Di Nitto, E.2
Fuggetta, A.3
-
35
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Springer
-
Taher El Gamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology. Lecture Notes in Computer Science, Vol. 196. Springer, 10-18. http://dl.acm.org/citation.cfm?id=19478.19480
-
(1985)
Advances in Cryptology. Lecture Notes in Computer Science
, vol.196
, pp. 10-18
-
-
Gamal, T.E.1
-
36
-
-
0345565888
-
The many faces of publish/subscribe
-
Patrick Th. Eugster, Pascal Felber, Rachid Guerraoui, and Anne-Marie Kermarrec. 2003. The many faces of publish/subscribe. ACM Computing Surveys 35, 2, 114-131. DOI:http://dx.doi.org/10.1145/857076.857078
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.Th.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
37
-
-
77951067501
-
Policybased data integration for e-health monitoring processes in a B2B environment: Experiences from Canada
-
Benjamin Eze, Craig Kuziemsky, Liam Peyton, Grant Middleton, and Alain Mouttham. 2010.Policybased data integration for e-health monitoring processes in a B2B environment: Experiences from Canada. Journal of Theoretical and Applied Electronic Commerce Research 5, 1, 56-70. http://dl.acm.org/citation.cfm?id=1807514.1807520
-
(2010)
Journal of Theoretical and Applied Electronic Commerce Research
, vol.5
, Issue.1
, pp. 56-70
-
-
Eze, B.1
Kuziemsky, C.2
Peyton, L.3
Middleton, G.4
Mouttham, A.5
-
39
-
-
0027986369
-
A minimal model for secure computation (extended abstract)
-
ACM, New York, NY
-
Uri Feige, Joe Killian, andMoni Naor. 1994. A minimal model for secure computation (extended abstract). In Proceedings of the 26th Annual ACM Symposium on Theory of Computing (STOC'94). ACM, New York, NY, 554-563.
-
(1994)
Proceedings of the 26th Annual ACM Symposium on Theory of Computing (STOC'94)
, pp. 554-563
-
-
Feige, U.1
Killian, J.2
Naor, M.3
-
40
-
-
31544456939
-
Security aspects in publish/subscribe systems
-
L. Fiege, A. Zeidler, A. Buchmann, R. Kilian-Kehr, G. Mühl, and T. Darmstadt. 2004. Security aspects in publish/subscribe systems. In Proceedings of the 3rd InternationalWorkshop on Distributed Event-Based Systems (DEBS'04).
-
(2004)
Proceedings of the 3rd InternationalWorkshop on Distributed Event-Based Systems (DEBS'04)
-
-
Fiege, L.1
Zeidler, A.2
Buchmann, A.3
Kilian-Kehr, R.4
Mühl, G.5
Darmstadt, T.6
-
41
-
-
85206024432
-
-
Technical Report UCI-ISR-05-8. Institute for Software Research, University of California, Irvine
-
Roberto S. Silva Filho and David F. Redmiles. 2005. A Survey on Versatility for Publish/Subscribe Infrastructures. Technical Report UCI-ISR-05-8. Institute for Software Research, University of California, Irvine. DOI:http://dx.doi.org/10.1.1.130.8031
-
(2005)
A Survey on Versatility for Publish/Subscribe Infrastructures
-
-
Filho, R.S.S.1
Redmiles, D.F.2
-
43
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Craig Gentry. 2010.Computing arbitrary functions of encrypted data. Communications of the ACM 53, 3, 97-105. DOI:http://dx.doi.org/10.1145/1666420.1666444
-
(2010)
Communications of the ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
45
-
-
84978180602
-
-
Retrieved May 30, 2016
-
Hedwig. 2012. Apache Hedwig. Retrieved May 30, 2016, from https://cwiki.apache.org/confluence/display/BOOKKEEPER/HedWig.
-
(2012)
Apache Hedwig
-
-
Hedwig1
-
48
-
-
84859443849
-
Design and implementation of a confidentiality and access control solution for publish/subscribe systems
-
Mihaela Ion, Giovanni Russello, and Bruno Crispo. 2012. Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Computer Networks 56, 7, 2014-2037.
-
(2012)
Computer Networks
, vol.56
, Issue.7
, pp. 2014-2037
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
49
-
-
77956439681
-
The PADRES publish/subscribe system
-
IGI Global, Hershey, PA
-
Hans-Arno Jacobsen, Alex Cheung, Guoli Lia, Balasubramaneyam Maniymaran, Vinod Muthusamy, and Reza Sherafat Kazemzadeh. 2010.The PADRES publish/subscribe system. In Principles and Applications of Distributed Event-Based Systems. IGI Global, Hershey, PA, 164-205.
-
(2010)
Principles and Applications of Distributed Event-Based Systems
, pp. 164-205
-
-
Jacobsen, H.1
Cheung, A.2
Lia, G.3
Maniymaran, B.4
Muthusamy, V.5
Kazemzadeh, R.S.6
-
50
-
-
84956869808
-
On quorum controlled asymmetric proxy re-encryption
-
Springer
-
Markus Jakobsson. 1999. On quorum controlled asymmetric proxy re-encryption. In Public Key Cryptography. Lecture Notes in Computer Science, Vol. 1560. Springer, 112-121. http://dl.acm.org/citation. cfm?id=648116.746589 Himanshu Khurana. 2005.
-
(1999)
Public Key Cryptography. Lecture Notes in Computer Science
, vol.1560
, pp. 112-121
-
-
Jakobsson, M.1
-
51
-
-
33644536683
-
Scalable security and accounting services for content-based publish/subscribe systems
-
Himanshu Khurana, 2005. Scalable security and accounting services for content-based publish/subscribe systems. In Proceedings of the ACM Symposium on Applied Computing (SAC'05). DOI:http://dx.doi.org/10.1145/1066677.1066862
-
(2005)
Proceedings of the ACM Symposium on Applied Computing (SAC'05)
-
-
Khurana, H.1
-
58
-
-
77952612384
-
Scalable ranked publish/subscribe
-
Ashwin Machanavajjhala, Erik Vee, Minos Garofalakis, and Jayavel Shanmugasundaram. 2008. Scalable ranked publish/subscribe. In Proceedings of the VLDB Endowment 1, 1, 451-462. DOI:http://dx.doi.org/10.1145/1453856.1453906
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, Issue.1
, pp. 451-462
-
-
Machanavajjhala, A.1
Vee, E.2
Garofalakis, M.3
Shanmugasundaram, J.4
-
59
-
-
0033084182
-
A survey of distributed enterprise network and systems management paradigms
-
Jean-Philippe Martin-Flatin, Simon Znaty, and Jean-Pierre Hubaux. 1999. A survey of distributed enterprise network and systems management paradigms. Journal of Network and Systems Management 7, 1, 9-26.
-
(1999)
Journal of Network and Systems Management
, vol.7
, Issue.1
, pp. 9-26
-
-
Martin-Flatin, J.-P.1
Znaty, S.2
Hubaux, J.-P.3
-
60
-
-
77249108336
-
Routing algorithms for content-based publish/subscribe systems
-
J. Legatheaux Martins and S. Duarte. 2010.Routing algorithms for content-based publish/subscribe systems. IEEE Communications Surveys and Tutorials 12, 1, 39-58.
-
(2010)
IEEE Communications Surveys and Tutorials
, vol.12
, Issue.1
, pp. 39-58
-
-
Martins, J.L.1
Duarte, S.2
-
61
-
-
84892996881
-
Performance/security tradeoffs for content-based routing supported by Bloom filters
-
Springer
-
Hugues Mercier, Emanuel Onica, Etienne Rivière, and Pascal Felber. 2013. Performance/security tradeoffs for content-based routing supported by Bloom filters. In Structural Information and Communication Complexity. Lecture Notes in Computer Science, Vol. 8179. Springer, 129-140.
-
(2013)
Structural Information and Communication Complexity. Lecture Notes in Computer Science
, vol.8179
, pp. 129-140
-
-
Mercier, H.1
Onica, E.2
Rivière, E.3
Felber, P.4
-
65
-
-
84883353658
-
Privacy preserving context aware publish subscribe systems
-
Springer
-
Mohamed Nabeel, Stefan Appel, Elisa Bertino, and Alejandro Buchmann. 2013. Privacy preserving context aware publish subscribe systems. In Network and System Security. Lecture Notes in Computer Science, Vol. 7873. Springer, 465-478. DOI:http://dx.doi.org/10.1007/978-3-642-38631-2-34
-
(2013)
Network and System Security. Lecture Notes in Computer Science
, vol.7873
, pp. 465-478
-
-
Nabeel, M.1
Appel, S.2
Bertino, E.3
Buchmann, A.4
-
71
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vol. 1592. Springer, 223-238. http://dl.acm.org/citation.cfm?id=1756123.1756146
-
(1999)
Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
73
-
-
78650441304
-
Design and implementation of the Rebeca publish/subscribe middleware
-
Springer-Verlag, Berlin, Germany
-
Helge Parzyjegla, Daniel Graff, Arnd Schröter, Jan Richling, and Gero Mühl. 2010.Design and implementation of the Rebeca publish/subscribe middleware. In From Active Data Management to Event-Based Systems and More. Springer-Verlag, Berlin, Germany, 124-140. http://dl.acm.org/citation.cfm?id=1985625.1985635
-
(2010)
From Active Data Management to Event-Based Systems and More
, pp. 124-140
-
-
Parzyjegla, H.1
Graff, D.2
Schröter, A.3
Richling, J.4
Mühl, G.5
-
74
-
-
67650409734
-
Rappel: Exploiting interest and network locality to improve fairness in publish-subscribe systems
-
Jay A. Patel, Etienne Rivière, Indranil Gupta, and Anne-Marie Kermarrec. 2009. Rappel: Exploiting interest and network locality to improve fairness in publish-subscribe systems. Computer Networks 53, 13, 2304-2320. http://dx.doi.org/10.1016/j.comnet.2009.03.018
-
(2009)
Computer Networks
, vol.53
, Issue.13
, pp. 2304-2320
-
-
Patel, J.A.1
Rivière, E.2
Gupta, I.3
Kermarrec, A.-M.4
-
77
-
-
36549013845
-
Access control in decentralised publish/subscribe systems
-
Lauri I. W. Pesonen, David M. Eyers, and Jean Bacon. 2007a. Access control in decentralised publish/subscribe systems. Journal of Networks 2, 2, 57-67.
-
(2007)
Journal of Networks
, vol.2
, Issue.2
, pp. 57-67
-
-
Pesonen, L.I.W.1
Eyers, D.M.2
Bacon, J.3
-
80
-
-
1542305520
-
Composite event detection as a generic middleware extension
-
Peter R. Pietzuch, Brian Shand, and Jean Bacon. 2004. Composite event detection as a generic middleware extension. IEEE Network 18, 1, 44-55.
-
(2004)
IEEE Network
, vol.18
, Issue.1
, pp. 44-55
-
-
Pietzuch, P.R.1
Shand, B.2
Bacon, J.3
-
81
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig and M. Hellman. 1978. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24, 1, 106-110.DOI:http://dx.doi.org/10.1109/TIT.1978.1055817
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
82
-
-
84865653421
-
CryptDB: Processing queries on an encrypted database
-
Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2012. CryptDB: Processing queries on an encrypted database. Communications of the ACM 55, 9, 103-111. DOI:http://dx.doi.org/10.1145/2330667.2330691
-
(2012)
Communications of the ACM
, vol.55
, Issue.9
, pp. 103-111
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
83
-
-
0345565893
-
A survey of key management for secure group communication
-
Sandro Rafaeli and David Hutchison. 2003. A survey of key management for secure group communication. ACM Computing Surveys 35, 3, 309-329. DOI:http://dx.doi.org/10.1145/937503.937506
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
85
-
-
84884753324
-
Toward efficient filter privacy-aware content-based pub/sub systems
-
Weixiong Rao, Lei Chen, and Sasu Tarkoma. 2013. Toward efficient filter privacy-aware content-based pub/sub systems. IEEE Transactions on Knowledge and Data Engineering 25, 11, 2644-2657. DOI:http://dx.doi.org/10.1109/TKDE.2012.177
-
(2013)
IEEE Transactions on Knowledge and Data Engineering
, vol.25
, Issue.11
, pp. 2644-2657
-
-
Rao, W.1
Chen, L.2
Tarkoma, S.3
-
86
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACMConference on Computer and Communications Security (CCS'09).
-
(2009)
Proceedings of the 16th ACMConference on Computer and Communications Security (CCS'09)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
87
-
-
84911359308
-
Cobra: Content-based filtering and aggregation of blogs and RSS feeds
-
Ian Rose, RohanMurty, Peter Pietzuch, Jonathan Ledlie, Mema Roussopoulos, and MattWelsh. 2007. Cobra: Content-based filtering and aggregation of blogs and RSS feeds. In Proceedings of the 4th USENIX Symposium on Networked Systems Design and Implementation (NSDI'07).
-
(2007)
Proceedings of the 4th USENIX Symposium on Networked Systems Design and Implementation (NSDI'07)
-
-
Rose, I.1
Murty, R.2
Pietzuch, P.3
Ledlie, J.4
Roussopoulos, M.5
Welsh, M.6
-
89
-
-
85050878821
-
-
Retrieved May 30, 2016
-
SGX. 2016. Intel Software Guard Extensions. Retrieved May 30, 2016, from https://software.intel.com/en-us/isa-extensions/intel-sgx.
-
(2016)
Intel Software Guard Extensions
-
-
SGX1
-
90
-
-
0038043478
-
Key establishment in large dynamic groups using oneway function trees
-
Alan T. Sherman and David A. McGrew. 2003. Key establishment in large dynamic groups using oneway function trees. IEEE Transactions on Software Engineering 29, 5, 444-458. DOI:http://dx.doi.org/10.1109/TSE.2003.1199073
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
92
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
Springer
-
Abdullatif Shikfa, Melek Nen, and Refik Molva. 2009. Privacy-preserving content-based publish/subscribe networks. In Emerging Challenges for Security, Privacy and Trust. IFIP Advances in Information and Communication Technology, Vol. 297. Springer, 270-282. DOI:http://dx.doi.org/10.1007/978-3-642-01244-0-24
-
(2009)
Emerging Challenges for Security, Privacy and Trust. IFIP Advances in Information and Communication Technology
, vol.297
, pp. 270-282
-
-
Shikfa, A.1
Nen, M.2
Molva, R.3
-
94
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. 2011. All your clouds are belong to us: Security analysis of cloud management interfaces. In Proceedings of the 3rd ACM Workshop on Cloud Computing Security (CCSW'11). DOI:http://dx.doi.org/10.1145/2046660.2046664
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security (CCSW'11)
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
98
-
-
84863145281
-
EventGuard: A system architecture for securing publish-subscribe networks
-
Article No. 10
-
Mudhakar Srivatsa, Ling Liu, and Arun Iyengar. 2011. EventGuard: A system architecture for securing publish-subscribe networks. ACM Transactions on Computer Systems 29, 4, Article No. 10.DOI:http://dx.doi.org/10.1145/2063509.2063510
-
(2011)
ACM Transactions on Computer Systems
, vol.29
, pp. 4
-
-
Srivatsa, M.1
Liu, L.2
Iyengar, A.3
-
99
-
-
26944457539
-
-
arXiv:cs/9810019 [cs.DC]
-
R. Strom, G. Banavar, T. Chandra, M. Kaplan, K. Miller, B. Mukherjee, D. Sturman, and M. Ward. 1998. Gryphon: An information flow based approach to message brokering. arXiv:cs/9810019 [cs.DC].
-
(1998)
Gryphon: An Information Flow Based Approach to Message Brokering
-
-
Strom, R.1
Banavar, G.2
Chandra, T.3
Kaplan, M.4
Miller, K.5
Mukherjee, B.6
Sturman, D.7
Ward, M.8
-
100
-
-
84891787641
-
Securing broker-less publish/subscribe systems using identity-based encryption
-
M. A. Tariq, B. Koldehofe, and K. Rothermel. 2014. Securing broker-less publish/subscribe systems using identity-based encryption. IEEE Transactions on Parallel and Distributed Systems 25, 2, 518-528.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 518-528
-
-
Tariq, M.A.1
Koldehofe, B.2
Rothermel, K.3
-
102
-
-
84872392788
-
An efficient privacy preserving pub-sub system for ubiquitous computing
-
Yuan Tian, Biao Song, MohammadMehedi Hassan, and Eui-Nam Huh. 2013. An efficient privacy preserving pub-sub system for ubiquitous computing. International Journal on Ad Hoc and Ubiquitous Computing 12, 1, 23-33.
-
(2013)
International Journal on Ad Hoc and Ubiquitous Computing
, vol.12
, Issue.1
, pp. 23-33
-
-
Tian, Y.1
Song, B.2
Hassan, M.M.3
Huh, E.-N.4
-
106
-
-
34548050218
-
A taxonomy for denial of service attacks in content-based publish/subscribe systems
-
ACM, New York, NY
-
Alex Wun, Alex Cheung, and Hans-Arno Jacobsen. 2007. A taxonomy for denial of service attacks in content-based publish/subscribe systems. In Proceedings of the Inaugural International Conference on Distributed Event-Based Systems (DEBS'07). ACM, New York, NY, 116-127. DOI:http://dx.doi.org/10.1145/1266894.1266917
-
(2007)
Proceedings of the Inaugural International Conference on Distributed Event-Based Systems (DEBS'07)
, pp. 116-127
-
-
Wun, A.1
Cheung, A.2
Jacobsen, H.-A.3
-
107
-
-
38349025815
-
A policy management framework for content-based publish/subscribe middleware
-
Springer
-
Alex Wun and Hans-Arno Jacobsen. 2007. A policy management framework for content-based publish/subscribe middleware. In Middleware 2007. Lecture Notes in Computer Science, Vol. 4834. Springer, 368-388.
-
(2007)
Middleware 2007. Lecture Notes in Computer Science
, vol.4834
, pp. 368-388
-
-
Wun, A.1
Jacobsen, H.-A.2
-
111
-
-
34247594207
-
Ferry: A P2P-based architecture for content-based publish/subscribe services
-
Yingwu Zhu and Yiming Hu. 2007. Ferry: A P2P-based architecture for content-based publish/subscribe services. IEEE Transactions on Parallel and Distributed Systems 18, 5, 672-685. DOI:http://dx.doi.org/10.1109/TPDS.2007.1012
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 672-685
-
-
Zhu, Y.1
Hu, Y.2
-
113
-
-
84980043611
-
-
Retrieved May 30, 2016
-
ZMQ. 2015. ZeroMQ Distributed Messaging. Retrieved May 30, 2016, from http://zeromq.org.
-
(2015)
ZeroMQ Distributed Messaging
-
-
ZMQ1
|