메뉴 건너뛰기




Volumn 49, Issue 2, 2017, Pages

Confidentiality-preserving publish/subscribe: A survey

Author keywords

Confidentiality; Publish subscribe

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; INFORMATION DISSEMINATION;

EID: 84978245297     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2940296     Document Type: Review
Times cited : (43)

References (114)
  • 4
    • 79953820974 scopus 로고    scopus 로고
    • Security in multi-domain event-based systems
    • Jean Bacon, David Eyers, Jatinder Singh, Brian Shand, Matteo Migliavacca, and Peter Pietzuch. 2010.Security in multi-domain event-based systems. IT 51, 5, 277-284.
    • (2010) IT , vol.51 , Issue.5 , pp. 277-284
    • Bacon, J.1    Eyers, D.2    Singh, J.3    Shand, B.4    Migliavacca, M.5    Pietzuch, P.6
  • 6
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Jean Bacon, Ken Moody, and Walt Yao. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security 5, 4, 492-540. DOI:http://dx.doi.org/10.1145/581271.581276
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 7
    • 84864276279 scopus 로고    scopus 로고
    • Distributed event routing in publish/subscribe systems
    • B. Garbinato, H. Miranda, and L. Rodrigues (Eds.) Springer, Berlin
    • Roberto Baldoni, Leonardo Querzoni, Sasu Tarkoma, and Antonino Virgillito. 2009. Distributed event routing in publish/subscribe systems. In Middleware for Network Eccentric and Mobile Applications, B. Garbinato, H. Miranda, and L. Rodrigues (Eds.). Springer, Berlin, 219-244. DOI:http://dx.doi.org/10.1007/978-3-540-89707-1-10
    • (2009) Middleware for Network Eccentric and Mobile Applications , pp. 219-244
    • Baldoni, R.1    Querzoni, L.2    Tarkoma, S.3    Virgillito, A.4
  • 16
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • Elisa Bertino and Elena Ferrari. 2002. Secure and selective dissemination of XML documents. ACM Transactions on Information and System Security 5, 3, 290-331. DOI:http://dx.doi.org/10.1145/545186.545190
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 22
    • 33644905483 scopus 로고    scopus 로고
    • Network applications of Bloom filters: A survey
    • Andrei Broder, Michael Mitzenmacher, and Andrei Broder. 2002. Network applications of Bloom filters: A survey. Internet Mathematics 1, 4, 636-646.
    • (2002) Internet Mathematics , vol.1 , Issue.4 , pp. 636-646
    • Broder, A.1    Mitzenmacher, M.2    Broder, A.3
  • 23
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area event notification service
    • Antonio Carzaniga, David S. Rosenblum, and Alexander L. Wolf. 2001. Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems 19, 3, 332-383.
    • (2001) ACM Transactions on Computer Systems , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.S.2    Wolf, A.L.3
  • 28
    • 78049360046 scopus 로고    scopus 로고
    • A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
    • Springer
    • Sunoh Choi, Gabriel Ghinita, and Elisa Bertino. 2010.A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In Database and Expert Systems Applications. Lecture Notes in Computer Science, Vol. 6261. Springer, 368-384.
    • (2010) Database and Expert Systems Applications. Lecture Notes in Computer Science , vol.6261 , pp. 368-384
    • Choi, S.1    Ghinita, G.2    Bertino, E.3
  • 32
    • 0035440934 scopus 로고    scopus 로고
    • The JEDI event-based infrastructure and its application to the development of the OPSSWFMS
    • Gianpaolo Cugola, Elisabetta Di Nitto, and Alfonso Fuggetta. 2001. The JEDI event-based infrastructure and its application to the development of the OPSSWFMS. IEEE Transactions on Software Engineering 27, 9, 827-850. DOI:http://dx.doi.org/10.1109/32.950318
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.9 , pp. 827-850
    • Cugola, G.1    Di Nitto, E.2    Fuggetta, A.3
  • 35
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Springer
    • Taher El Gamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology. Lecture Notes in Computer Science, Vol. 196. Springer, 10-18. http://dl.acm.org/citation.cfm?id=19478.19480
    • (1985) Advances in Cryptology. Lecture Notes in Computer Science , vol.196 , pp. 10-18
    • Gamal, T.E.1
  • 36
  • 37
    • 77951067501 scopus 로고    scopus 로고
    • Policybased data integration for e-health monitoring processes in a B2B environment: Experiences from Canada
    • Benjamin Eze, Craig Kuziemsky, Liam Peyton, Grant Middleton, and Alain Mouttham. 2010.Policybased data integration for e-health monitoring processes in a B2B environment: Experiences from Canada. Journal of Theoretical and Applied Electronic Commerce Research 5, 1, 56-70. http://dl.acm.org/citation.cfm?id=1807514.1807520
    • (2010) Journal of Theoretical and Applied Electronic Commerce Research , vol.5 , Issue.1 , pp. 56-70
    • Eze, B.1    Kuziemsky, C.2    Peyton, L.3    Middleton, G.4    Mouttham, A.5
  • 41
    • 85206024432 scopus 로고    scopus 로고
    • Technical Report UCI-ISR-05-8. Institute for Software Research, University of California, Irvine
    • Roberto S. Silva Filho and David F. Redmiles. 2005. A Survey on Versatility for Publish/Subscribe Infrastructures. Technical Report UCI-ISR-05-8. Institute for Software Research, University of California, Irvine. DOI:http://dx.doi.org/10.1.1.130.8031
    • (2005) A Survey on Versatility for Publish/Subscribe Infrastructures
    • Filho, R.S.S.1    Redmiles, D.F.2
  • 43
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • Craig Gentry. 2010.Computing arbitrary functions of encrypted data. Communications of the ACM 53, 3, 97-105. DOI:http://dx.doi.org/10.1145/1666420.1666444
    • (2010) Communications of the ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 45
    • 84978180602 scopus 로고    scopus 로고
    • Retrieved May 30, 2016
    • Hedwig. 2012. Apache Hedwig. Retrieved May 30, 2016, from https://cwiki.apache.org/confluence/display/BOOKKEEPER/HedWig.
    • (2012) Apache Hedwig
    • Hedwig1
  • 48
    • 84859443849 scopus 로고    scopus 로고
    • Design and implementation of a confidentiality and access control solution for publish/subscribe systems
    • Mihaela Ion, Giovanni Russello, and Bruno Crispo. 2012. Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Computer Networks 56, 7, 2014-2037.
    • (2012) Computer Networks , vol.56 , Issue.7 , pp. 2014-2037
    • Ion, M.1    Russello, G.2    Crispo, B.3
  • 50
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • Springer
    • Markus Jakobsson. 1999. On quorum controlled asymmetric proxy re-encryption. In Public Key Cryptography. Lecture Notes in Computer Science, Vol. 1560. Springer, 112-121. http://dl.acm.org/citation. cfm?id=648116.746589 Himanshu Khurana. 2005.
    • (1999) Public Key Cryptography. Lecture Notes in Computer Science , vol.1560 , pp. 112-121
    • Jakobsson, M.1
  • 51
    • 33644536683 scopus 로고    scopus 로고
    • Scalable security and accounting services for content-based publish/subscribe systems
    • Himanshu Khurana, 2005. Scalable security and accounting services for content-based publish/subscribe systems. In Proceedings of the ACM Symposium on Applied Computing (SAC'05). DOI:http://dx.doi.org/10.1145/1066677.1066862
    • (2005) Proceedings of the ACM Symposium on Applied Computing (SAC'05)
    • Khurana, H.1
  • 60
    • 77249108336 scopus 로고    scopus 로고
    • Routing algorithms for content-based publish/subscribe systems
    • J. Legatheaux Martins and S. Duarte. 2010.Routing algorithms for content-based publish/subscribe systems. IEEE Communications Surveys and Tutorials 12, 1, 39-58.
    • (2010) IEEE Communications Surveys and Tutorials , vol.12 , Issue.1 , pp. 39-58
    • Martins, J.L.1    Duarte, S.2
  • 71
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer
    • Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vol. 1592. Springer, 223-238. http://dl.acm.org/citation.cfm?id=1756123.1756146
    • (1999) Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 74
    • 67650409734 scopus 로고    scopus 로고
    • Rappel: Exploiting interest and network locality to improve fairness in publish-subscribe systems
    • Jay A. Patel, Etienne Rivière, Indranil Gupta, and Anne-Marie Kermarrec. 2009. Rappel: Exploiting interest and network locality to improve fairness in publish-subscribe systems. Computer Networks 53, 13, 2304-2320. http://dx.doi.org/10.1016/j.comnet.2009.03.018
    • (2009) Computer Networks , vol.53 , Issue.13 , pp. 2304-2320
    • Patel, J.A.1    Rivière, E.2    Gupta, I.3    Kermarrec, A.-M.4
  • 77
    • 36549013845 scopus 로고    scopus 로고
    • Access control in decentralised publish/subscribe systems
    • Lauri I. W. Pesonen, David M. Eyers, and Jean Bacon. 2007a. Access control in decentralised publish/subscribe systems. Journal of Networks 2, 2, 57-67.
    • (2007) Journal of Networks , vol.2 , Issue.2 , pp. 57-67
    • Pesonen, L.I.W.1    Eyers, D.M.2    Bacon, J.3
  • 80
    • 1542305520 scopus 로고    scopus 로고
    • Composite event detection as a generic middleware extension
    • Peter R. Pietzuch, Brian Shand, and Jean Bacon. 2004. Composite event detection as a generic middleware extension. IEEE Network 18, 1, 44-55.
    • (2004) IEEE Network , vol.18 , Issue.1 , pp. 44-55
    • Pietzuch, P.R.1    Shand, B.2    Bacon, J.3
  • 81
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S. Pohlig and M. Hellman. 1978. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24, 1, 106-110.DOI:http://dx.doi.org/10.1109/TIT.1978.1055817
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 82
    • 84865653421 scopus 로고    scopus 로고
    • CryptDB: Processing queries on an encrypted database
    • Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2012. CryptDB: Processing queries on an encrypted database. Communications of the ACM 55, 9, 103-111. DOI:http://dx.doi.org/10.1145/2330667.2330691
    • (2012) Communications of the ACM , vol.55 , Issue.9 , pp. 103-111
    • Popa, R.A.1    Redfield, C.M.S.2    Zeldovich, N.3    Balakrishnan, H.4
  • 83
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Sandro Rafaeli and David Hutchison. 2003. A survey of key management for secure group communication. ACM Computing Surveys 35, 3, 309-329. DOI:http://dx.doi.org/10.1145/937503.937506
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 85
    • 84884753324 scopus 로고    scopus 로고
    • Toward efficient filter privacy-aware content-based pub/sub systems
    • Weixiong Rao, Lei Chen, and Sasu Tarkoma. 2013. Toward efficient filter privacy-aware content-based pub/sub systems. IEEE Transactions on Knowledge and Data Engineering 25, 11, 2644-2657. DOI:http://dx.doi.org/10.1109/TKDE.2012.177
    • (2013) IEEE Transactions on Knowledge and Data Engineering , vol.25 , Issue.11 , pp. 2644-2657
    • Rao, W.1    Chen, L.2    Tarkoma, S.3
  • 89
    • 85050878821 scopus 로고    scopus 로고
    • Retrieved May 30, 2016
    • SGX. 2016. Intel Software Guard Extensions. Retrieved May 30, 2016, from https://software.intel.com/en-us/isa-extensions/intel-sgx.
    • (2016) Intel Software Guard Extensions
    • SGX1
  • 90
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using oneway function trees
    • Alan T. Sherman and David A. McGrew. 2003. Key establishment in large dynamic groups using oneway function trees. IEEE Transactions on Software Engineering 29, 5, 444-458. DOI:http://dx.doi.org/10.1109/TSE.2003.1199073
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 98
    • 84863145281 scopus 로고    scopus 로고
    • EventGuard: A system architecture for securing publish-subscribe networks
    • Article No. 10
    • Mudhakar Srivatsa, Ling Liu, and Arun Iyengar. 2011. EventGuard: A system architecture for securing publish-subscribe networks. ACM Transactions on Computer Systems 29, 4, Article No. 10.DOI:http://dx.doi.org/10.1145/2063509.2063510
    • (2011) ACM Transactions on Computer Systems , vol.29 , pp. 4
    • Srivatsa, M.1    Liu, L.2    Iyengar, A.3
  • 107
    • 38349025815 scopus 로고    scopus 로고
    • A policy management framework for content-based publish/subscribe middleware
    • Springer
    • Alex Wun and Hans-Arno Jacobsen. 2007. A policy management framework for content-based publish/subscribe middleware. In Middleware 2007. Lecture Notes in Computer Science, Vol. 4834. Springer, 368-388.
    • (2007) Middleware 2007. Lecture Notes in Computer Science , vol.4834 , pp. 368-388
    • Wun, A.1    Jacobsen, H.-A.2
  • 111
    • 34247594207 scopus 로고    scopus 로고
    • Ferry: A P2P-based architecture for content-based publish/subscribe services
    • Yingwu Zhu and Yiming Hu. 2007. Ferry: A P2P-based architecture for content-based publish/subscribe services. IEEE Transactions on Parallel and Distributed Systems 18, 5, 672-685. DOI:http://dx.doi.org/10.1109/TPDS.2007.1012
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.5 , pp. 672-685
    • Zhu, Y.1    Hu, Y.2
  • 113
    • 84980043611 scopus 로고    scopus 로고
    • Retrieved May 30, 2016
    • ZMQ. 2015. ZeroMQ Distributed Messaging. Retrieved May 30, 2016, from http://zeromq.org.
    • (2015) ZeroMQ Distributed Messaging
    • ZMQ1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.