-
1
-
-
0345565888
-
The many faces of publish/subscribe
-
P. Eugster, P. Felber, R. Guerraoui, and A.-M. Kermarrec, "The many faces of publish/subscribe," ACM Comput. Surveys, vol. 35, no. 2, pp. 114-131, 2003.
-
(2003)
ACM Comput. Surveys
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
2
-
-
84881148912
-
StreamHub: A massively parallel architecture for high-performance content-based publish/subscribe
-
Jul
-
R. P. Barazzutti, P. Felber, C. Fetzer, E. Onica, M. Pasin, J.-F. Pineau, E. Riviere, and S. Weigert, "StreamHub: A massively parallel architecture for high-performance content-based publish/subscribe," in Proc. 7th ACM Int. Conf. Distrib. Event-Based Syst., Jul. 2013, pp. 63-74.
-
(2013)
Proc. 7th ACM Int. Conf. Distrib. Event-Based Syst
, pp. 63-74
-
-
Barazzutti, R.P.1
Felber, P.2
Fetzer, C.3
Onica, E.4
Pasin, M.5
Pineau, J.-F.6
Riviere, E.7
Weigert, S.8
-
3
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds," in Proc. 16th ACM Conf.comput.commun. Secur., 2009, pp. 199-212.
-
(2009)
Proc. 16th ACM Conf.comput.commun. Secur
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
4
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "All your clouds are belong to us: Security analysis of cloud management interfaces," in Proc. 3rd ACM Workshop Cloud Comput. Secur. Workshop, 2011, pp. 3-14.
-
(2011)
Proc. 3rd ACM Workshop Cloud Comput. Secur. Workshop
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
5
-
-
85021702280
-
The cloud: Data protection and privacy-whose cloud is it anyway?
-
S. Liston, "The Cloud: Data protection and privacy-Whose cloud is it anyway?" in Proc. 12th Global Symp. Regulators, 2012, pp. 1-40.
-
(2012)
Proc. 12th Global Symp. Regulators
, pp. 1-40
-
-
Liston, S.1
-
6
-
-
78049360046
-
A privacy-enhancing contentbased publish/subscribe system using scalar product preserving transformations
-
S. Choi, G. Ghinita, and E. Bertino, "A privacy-enhancing contentbased publish/subscribe system using scalar product preserving transformations," in Proc. 21st Int. Conf. Database Expert Syst. Appl., vol. 6261, 2010, pp. 368-384.
-
(2010)
Proc. 21st Int. Conf. Database Expert Syst. Appl
, vol.6261
, pp. 368-384
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
7
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases," in Proc. 35th SIGMOD Int. Conf. Manage. Data, 2009, pp. 139-152.
-
(2009)
Proc. 35th SIGMOD Int. Conf. Manage. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
8
-
-
50049089599
-
Enabling confidentiality in content- based publish/subscribe infrastructures
-
C. Raiciu and D. S. Rosenblum, "Enabling confidentiality in content- based publish/subscribe infrastructures," in Proc. IEEE Securecomm, 2006, pp. 1-11.
-
(2006)
Proc. IEEE Securecomm
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
9
-
-
84885059952
-
Privacy-preserving contentbased publish/subscribe networks
-
A. Shikfa, M. Onen, and R. Molva, "Privacy-preserving contentbased publish/subscribe networks," in Proc. Emerging Challenges Security, Privacy Trust, 2009, pp. 270-282.
-
(2009)
Proc. Emerging Challenges Security, Privacy Trust
, pp. 270-282
-
-
Shikfa, A.1
Onen, M.2
Molva, R.3
-
10
-
-
81155153612
-
-
Purdue Univ., West Lafayette, Indiana, USA, Tech. Rep
-
M. Nabeel, N. Shang, and E. Bertino, "Privacy-preserving filtering and covering in content-based publish subscribe systems," Purdue Univ., West Lafayette, Indiana, USA, Tech. Rep. 15, 2009.
-
(2009)
Privacy-preserving Filtering and Covering in Content-based Publish Subscribe Systems
, vol.15
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
11
-
-
84878346477
-
Supporting publication and subscription confidentiality in pub/sub networks
-
M. Ion, G. Russello, and B. Crispo, "Supporting publication and subscription confidentiality in pub/sub networks," in Proc. 6th Int. ICST Conf. Security Privacy Commun. Netw., 2010, pp. 272-289.
-
(2010)
Proc. 6th Int. ICST Conf. Security Privacy Commun. Netw
, pp. 272-289
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
12
-
-
50049113532
-
-
College of Comput., Georgia Instit. Technol., Tech. Rep. GIT-CC-04-01
-
J. Li, C. Lu, and W. Shi, "An efficient scheme for preserving confidentiality in content-based publish-subscribe systems," College of Comput., Georgia Instit. Technol., Tech. Rep. GIT-CC-04-01, 2004.
-
(2004)
An Efficient Scheme for Preserving Confidentiality in Content-based Publish-subscribe Systems
-
-
Li, J.1
Lu, C.2
Shi, W.3
-
13
-
-
85139857286
-
MICS: An efficient content space representation model for publish/subscribe systems
-
H. Jafarpour, S. Mehrotra, N. Venkatasubramanian, and M. Montanari, "MICS: An efficient content space representation model for publish/subscribe systems," in Proc. 3rd ACM Int. Conf. Distrib. Event-Based Syst., 2009, pp. 1-12.
-
(2009)
Proc. 3rd ACM Int. Conf. Distrib. Event-Based Syst
, pp. 1-12
-
-
Jafarpour, H.1
Mehrotra, S.2
Venkatasubramanian, N.3
Montanari, M.4
-
14
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
A. Carzaniga, D. S. Rosenblum, and A. L. Wolf, "Design and evaluation of a wide-area event notification service," ACM Trans.comput. Syst., vol. 19, no. 3, pp. 332-383, 2001.
-
(2001)
ACM Trans.comput. Syst
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
15
-
-
77956439681
-
The PADRES publish/subscribe system
-
IGI Global
-
H.-A. Jacobsen, A. K. Y. Cheung, G. Li, B. Maniymaran, V. Muthusamy, and R. S. Kazemzadeh, "The PADRES publish/subscribe system," in Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies, IGI Global, pp. 164-205, 2010.
-
(2010)
Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies
, pp. 164-205
-
-
Jacobsen, H.-A.1
Cheung, A.K.Y.2
Li, G.3
Maniymaran, B.4
Muthusamy, V.5
Kazemzadeh, R.S.6
-
16
-
-
84865000588
-
Thrifty privacy: Efficient support for privacy-preserving publish/subscribe
-
R. Barazzutti, P. Felber, H. Mercier, E. Onica, and E. Riviere, "Thrifty privacy: Efficient support for privacy-preserving publish/subscribe," in Proc. 6th ACM Int. Conf. Distrib. Event-Based Syst., 2012, pp. 225-236.
-
(2012)
Proc. 6th ACM Int. Conf. Distrib. Event-Based Syst
, pp. 225-236
-
-
Barazzutti, R.1
Felber, P.2
Mercier, H.3
Onica, E.4
Riviere, E.5
-
17
-
-
84892996881
-
Performance/appurity tradeoffs for content-based routing supported by Bloom filters
-
Jul
-
H. Mercier, E. Onica, E. Rivière, and P. Felber, "Performance/appurity tradeoffs for content-based routing supported by Bloom filters," in Proc. 20th Int. Colloquium Structural Inf.commun.complexity, Jul. 2013, pp. 129-140.
-
(2013)
Proc. 20th Int. Colloquium Structural Inf.commun.complexity
, pp. 129-140
-
-
Mercier, H.1
Onica, E.2
Rivière, E.3
Felber, P.4
-
18
-
-
52649087713
-
A hybrid approach to private record linkage
-
A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco, "A hybrid approach to private record linkage," in Proc. IEEE 30th Int. Conf. Data Eng., 2008, pp. 496-505.
-
(2008)
Proc. IEEE 30th Int. Conf. Data Eng
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
19
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commn. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commn. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
20
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Proc. 16th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1996, pp. 1-15.
-
(1996)
Proc. 16th Annu. Int. Cryptol. Conf. Adv. Cryptol
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
21
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Softw. Eng
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
22
-
-
57549093852
-
Access control in publish/subscribe systems
-
J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, "Access control in publish/subscribe systems," in Proc. 2nd Int. Conf. Distrib. Event-Based Syst., 2008, pp. 23-34.
-
(2008)
Proc. 2nd Int. Conf. Distrib. Event-Based Syst
, pp. 23-34
-
-
Bacon, J.1
Eyers, D.M.2
Singh, J.3
Pietzuch, P.R.4
-
23
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H. H. Chan, D. Song, and A. Perrig, "Multi-dimensional range query over encrypted data," in Proc. IEEE Symp. Security Privacy, 2007, pp. 350-364.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
24
-
-
0004100864
-
-
Cambridge Mathematical Library, Cambridge University Press, Cambridge, UK
-
G. E. Andrews, The Theory of Partitions. Cambridge Mathematical Library, Cambridge University Press, Cambridge, UK, 1998.
-
(1998)
The Theory of Partitions
-
-
Andrews, G.E.1
-
25
-
-
0004155526
-
-
2nd ed. Reading, MA, USA: Addison-Wesley
-
R. L. Graham, D. E. Knuth, and O. Patashnik, Concrete Mathematics: A Foundation for Computer Science, 2nd ed. Reading, MA, USA: Addison-Wesley, 1994.
-
(1994)
Concrete Mathematics: A Foundation for Computer Science
-
-
Graham, R.L.1
Knuth, D.E.2
Patashnik, O.3
-
26
-
-
35048848668
-
Meghdoot: Content-based publish/subscribe over p2p networks
-
Middleware
-
A. Gupta, O. D. Sahin, D. Agrawal, and A. E. Abbadi, "Meghdoot: Content-based publish/subscribe over p2p networks," in Proc. 5th ACM/IFIP/USENIX Int. Conf. Middleware, 2004, pp. 254-273.
-
(2004)
Proc. 5th ACM/IFIP/USENIX Int. Conf
, pp. 254-273
-
-
Gupta, A.1
Sahin, O.D.2
Agrawal, D.3
Abbadi, A.E.4
-
27
-
-
24744469980
-
Power laws, Pareto distributions and Zipf's law
-
M. E. J. Newman, "Power laws, Pareto distributions and Zipf's law," Contemporary Phys., vol. 46, pp. 323-351, 2005.
-
(2005)
Contemporary Phys
, vol.46
, pp. 323-351
-
-
Newman, M.E.J.1
-
28
-
-
78649988562
-
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health
-
M. Ion, G. Russello, and B. Crispo, "An implementation of event and filter confidentiality in pub/sub systems and its application to e-health," in Proc. 17th ACM Conf.comput.commun. Security, 2010, pp. 696-698.
-
(2010)
Proc. 17th ACM Conf.comput.commun. Security
, pp. 696-698
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
29
-
-
79960282726
-
Public-key encrypted Bloom filters with applications to supply chain integrity
-
F. Kerschbaum, "Public-key encrypted Bloom filters with applications to supply chain integrity," in Proc. Data Appl. Security Privacy XXV, 2011, vol. 6818, pp. 60-75.
-
(2011)
Proc. Data Appl. Security Privacy
, vol.25
, Issue.6818
, pp. 60-75
-
-
Kerschbaum, F.1
-
30
-
-
79961188847
-
Broker-based private matching
-
A. Shikfa, M. Onen, and R. Molva, "Broker-based private matching," in Proc. 11th Int. Conf. Privacy Enhancing Technol., 2011, pp. 264-284.
-
(2011)
Proc. 11th Int. Conf. Privacy Enhancing Technol
, pp. 264-284
-
-
Shikfa, A.1
Onen, M.2
Molva, R.3
-
31
-
-
84873659784
-
Fast confidential search for bio-medical data using Bloom filters and homomorphic cryptography
-
H. Perl, Y. Mohammed, M. Brenner, and M. Smith, "Fast confidential search for bio-medical data using Bloom filters and homomorphic cryptography," in Proc. IEEE 8th Int. Conf. E-Sci., 2012, pp. 1-8.
-
(2012)
Proc. IEEE 8th Int. Conf. E-Sci
, pp. 1-8
-
-
Perl, H.1
Mohammed, Y.2
Brenner, M.3
Smith, M.4
-
33
-
-
33744908786
-
Privacy-enhanced searches using encrypted Bloom filters
-
S. M. Bellovin and W. R. Cheswick, "Privacy-enhanced searches using encrypted Bloom filters," Cryptology ePrint Archive, p. 22, 2004.
-
(2004)
Cryptology EPrint Archive
, pp. 22
-
-
Bellovin, S.M.1
Cheswick, W.R.2
-
34
-
-
79961178764
-
A constraint satisfaction cryptanalysis of Bloom filters in private record linkage
-
M. Kuzu, M. Kantarcioglu, E. Durham, and B. Malin, "A constraint satisfaction cryptanalysis of Bloom filters in private record linkage," in Proc. 11th Int. Conf. Privacy Enhancing Technol., 2011, vol. 6794, pp. 226-245.
-
(2011)
Proc. 11th Int. Conf. Privacy Enhancing Technol
, vol.6794
, pp. 226-245
-
-
Kuzu, M.1
Kantarcioglu, M.2
Durham, E.3
Malin, B.4
-
35
-
-
85027943921
-
Theory and practice of Bloom filters for distributed systems
-
Jan.-Mar
-
S. Tarkoma, C. E. Rothenberg, and E. Lagerspetz, "Theory and practice of Bloom filters for distributed systems," IEEE Commun. Surv. Tuts, vol. 14, no. 1, pp. 131-155, Jan.-Mar. 2012.
-
(2012)
IEEE Commun. Surv. Tuts
, vol.14
, Issue.1
, pp. 131-155
-
-
Tarkoma, S.1
Rothenberg, C.E.2
Lagerspetz, E.3
-
37
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: Protecting confidentiality with encrypted query processing," in Proc. 23rd ACM Symp. Oper. Syst. Principles, 2011, pp. 85-100.
-
(2011)
Proc. 23rd ACM Symp. Oper. Syst. Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
38
-
-
84991462829
-
-
Master's thesis, University of Neuchatel, Neuchatel, Switzerland, Jul
-
M. Kurpicz, "Towards efficient privacy-preserving SQL processing in untrusted clouds," Master's thesis, University of Neuchatel, Neuchatel, Switzerland, Jul. 2013.
-
(2013)
Towards Efficient Privacy-preserving SQL Processing in Untrusted Clouds
-
-
Kurpicz, M.1
|