메뉴 건너뛰기




Volumn 14, Issue 3, 2017, Pages 308-325

Efficient and confidentiality-preserving content- based publish/subscribe with prefiltering

Author keywords

Bloom filters; Confidentiality; Encrypted processing; Publish subscribe; Security

Indexed keywords

BLOOMS (METAL); CRYPTOGRAPHY; DATA STRUCTURES; MIDDLEWARE; NETWORK SECURITY;

EID: 85021751604     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2015.2449831     Document Type: Article
Times cited : (17)

References (38)
  • 5
    • 85021702280 scopus 로고    scopus 로고
    • The cloud: Data protection and privacy-whose cloud is it anyway?
    • S. Liston, "The Cloud: Data protection and privacy-Whose cloud is it anyway?" in Proc. 12th Global Symp. Regulators, 2012, pp. 1-40.
    • (2012) Proc. 12th Global Symp. Regulators , pp. 1-40
    • Liston, S.1
  • 6
    • 78049360046 scopus 로고    scopus 로고
    • A privacy-enhancing contentbased publish/subscribe system using scalar product preserving transformations
    • S. Choi, G. Ghinita, and E. Bertino, "A privacy-enhancing contentbased publish/subscribe system using scalar product preserving transformations," in Proc. 21st Int. Conf. Database Expert Syst. Appl., vol. 6261, 2010, pp. 368-384.
    • (2010) Proc. 21st Int. Conf. Database Expert Syst. Appl , vol.6261 , pp. 368-384
    • Choi, S.1    Ghinita, G.2    Bertino, E.3
  • 8
    • 50049089599 scopus 로고    scopus 로고
    • Enabling confidentiality in content- based publish/subscribe infrastructures
    • C. Raiciu and D. S. Rosenblum, "Enabling confidentiality in content- based publish/subscribe infrastructures," in Proc. IEEE Securecomm, 2006, pp. 1-11.
    • (2006) Proc. IEEE Securecomm , pp. 1-11
    • Raiciu, C.1    Rosenblum, D.S.2
  • 14
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area event notification service
    • A. Carzaniga, D. S. Rosenblum, and A. L. Wolf, "Design and evaluation of a wide-area event notification service," ACM Trans.comput. Syst., vol. 19, no. 3, pp. 332-383, 2001.
    • (2001) ACM Trans.comput. Syst , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.S.2    Wolf, A.L.3
  • 19
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commn. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commn. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 21
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003.
    • (2003) IEEE Trans. Softw. Eng , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 24
    • 0004100864 scopus 로고    scopus 로고
    • Cambridge Mathematical Library, Cambridge University Press, Cambridge, UK
    • G. E. Andrews, The Theory of Partitions. Cambridge Mathematical Library, Cambridge University Press, Cambridge, UK, 1998.
    • (1998) The Theory of Partitions
    • Andrews, G.E.1
  • 27
    • 24744469980 scopus 로고    scopus 로고
    • Power laws, Pareto distributions and Zipf's law
    • M. E. J. Newman, "Power laws, Pareto distributions and Zipf's law," Contemporary Phys., vol. 46, pp. 323-351, 2005.
    • (2005) Contemporary Phys , vol.46 , pp. 323-351
    • Newman, M.E.J.1
  • 28
    • 78649988562 scopus 로고    scopus 로고
    • An implementation of event and filter confidentiality in pub/sub systems and its application to e-health
    • M. Ion, G. Russello, and B. Crispo, "An implementation of event and filter confidentiality in pub/sub systems and its application to e-health," in Proc. 17th ACM Conf.comput.commun. Security, 2010, pp. 696-698.
    • (2010) Proc. 17th ACM Conf.comput.commun. Security , pp. 696-698
    • Ion, M.1    Russello, G.2    Crispo, B.3
  • 29
    • 79960282726 scopus 로고    scopus 로고
    • Public-key encrypted Bloom filters with applications to supply chain integrity
    • F. Kerschbaum, "Public-key encrypted Bloom filters with applications to supply chain integrity," in Proc. Data Appl. Security Privacy XXV, 2011, vol. 6818, pp. 60-75.
    • (2011) Proc. Data Appl. Security Privacy , vol.25 , Issue.6818 , pp. 60-75
    • Kerschbaum, F.1
  • 31
    • 84873659784 scopus 로고    scopus 로고
    • Fast confidential search for bio-medical data using Bloom filters and homomorphic cryptography
    • H. Perl, Y. Mohammed, M. Brenner, and M. Smith, "Fast confidential search for bio-medical data using Bloom filters and homomorphic cryptography," in Proc. IEEE 8th Int. Conf. E-Sci., 2012, pp. 1-8.
    • (2012) Proc. IEEE 8th Int. Conf. E-Sci , pp. 1-8
    • Perl, H.1    Mohammed, Y.2    Brenner, M.3    Smith, M.4
  • 33
    • 33744908786 scopus 로고    scopus 로고
    • Privacy-enhanced searches using encrypted Bloom filters
    • S. M. Bellovin and W. R. Cheswick, "Privacy-enhanced searches using encrypted Bloom filters," Cryptology ePrint Archive, p. 22, 2004.
    • (2004) Cryptology EPrint Archive , pp. 22
    • Bellovin, S.M.1    Cheswick, W.R.2
  • 35
    • 85027943921 scopus 로고    scopus 로고
    • Theory and practice of Bloom filters for distributed systems
    • Jan.-Mar
    • S. Tarkoma, C. E. Rothenberg, and E. Lagerspetz, "Theory and practice of Bloom filters for distributed systems," IEEE Commun. Surv. Tuts, vol. 14, no. 1, pp. 131-155, Jan.-Mar. 2012.
    • (2012) IEEE Commun. Surv. Tuts , vol.14 , Issue.1 , pp. 131-155
    • Tarkoma, S.1    Rothenberg, C.E.2    Lagerspetz, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.