{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T12:10:11Z","timestamp":1737375011083,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403173"},{"type":"electronic","value":"9783540448921"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44892-6_12","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T10:51:40Z","timestamp":1187261500000},"page":"222-241","source":"Crossref","is-referenced-by-count":1,"title":["On Shouting \u201cFire!\u201d: Regulating Decoupled Communication in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Takahiro","family":"Murata","sequence":"first","affiliation":[]},{"given":"Naftaly H.","family":"Minsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"12_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/3-540-45263-X_9","volume-title":"Proc. of Fourth International Conference on Coordination Models and Languages; Limassol, Cyprus","author":"X. Ao","year":"2000","unstructured":"X. Ao, N. Minsky, T. Nguyen, and V. Ungureanu. Law-governed communities over the internet. In Proc. of Fourth International Conference on Coordination Models and Languages; Limassol, Cyprus; LNCS 1906, pages 133\u2013147, September 2000. http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html) ."},{"key":"12_CR2","unstructured":"X. Ao, N. Minsky, and V. Ungureanu. Formal treatment of certificate revocation under communal access control. In Proc. of the 2001 IEEE Symposium on Security and Privacy, May 2001, Oakland California, May 2001. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html) ."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"A. Campailla, S. Chaki, E. Clarke, S. Jha, and H. Veith. Efficient filtering in publish-subscirbe systems using binary decision diagrams. In Proc. of The 23rd Intn\u2019l Conf. on Soft. Eng. (ICSE), pages 443\u2013452, May 2001.","DOI":"10.1109\/ICSE.2001.919117"},{"issue":"4","key":"12_CR4","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1145\/63334.63337","volume":"32","author":"N. Carriero","year":"1989","unstructured":"N. Carriero and D. Gelernter. Linda in context. Communications of the ACM, 32(4):444\u2013458, April 1989.","journal-title":"Communications of the ACM"},{"key":"12_CR5","unstructured":"P.Th. Eugster, P. Felber, R. Guerraoui, and A.-M. Kermarrec. The many faces of publish\/subscribe. Technical report, EPFL, January 2001. DSC ID: 2000104."},{"key":"12_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-54834-3_5","volume-title":"Proc. of VDM\u2019 91: 4th Intn\u2019l Sympo. of VDM Europe on Foraml Software Development Methods","author":"D. Garlan","year":"1991","unstructured":"D. Garlan and D. Notkin. Formalizing dsign spaces: Implicit invocation mechanisms. In Proc. of VDM\u2019 91: 4th Intn\u2019l Sympo. of VDM Europe on Foraml Software Development Methods; LNCS 551, pages 31\u201344, Noordwijkerhout, The Netherlands, October 1991. Springer-Verlag."},{"key":"12_CR7","unstructured":"M. Hapner et al. Java Message Service. Sun Microsystems Inc., August 2001. Version 1.0.2b, website: http:\/\/java.sun.com\/products\/jms\/docs.html ."},{"key":"12_CR8","unstructured":"IBM Corp. Gryphon-The system. website: http:\/\/www.research.ibm.com\/gryphon\/Gryphon\/gryphon.html ."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"G. Karjoth. The authorization service of tivoli policy director. In Proc. of the 17th Annual Computer Security Applications Conf. (ACSAC 2001), December 2001.","DOI":"10.1109\/ACSAC.2001.991547"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Z. Mikl\u00f3s. Towards an access control mechanism for wide-are publish\/subscribe systems. In Proc. of Intn\u2019l Workshop on Distributed Event-Based Systems (DEBS\u201902), July 2002.","DOI":"10.1109\/ICDCSW.2002.1030820"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"N.H. Minsky. The imposition of protocols over open distributed systems. IEEE Transactions on Software Engineering, February 1991.","DOI":"10.1109\/32.67599"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/08839510150204590","volume":"15","author":"N.H. Minsky","year":"2001","unstructured":"N.H. Minsky, Y.M. Minsky, and V. Ungureanu. Safe tuplespace-based coordination in multiagent systems. Journal of Applied Artificial Intelligence (AAI), 15(1):11\u201333, January 2001. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html) .","journal-title":"Journal of Applied Artificial Intelligence (AAI)"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/352591.352592","volume":"9","author":"N.H. Minsky","year":"2000","unstructured":"N.H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. TOSEM, ACM Transactions on Software Engineering and Methodology, 9(3):273\u2013305, July 2000. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html) .","journal-title":"TOSEM, ACM Transactions on Software Engineering and Methodology"},{"key":"12_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-63531-9_24","volume-title":"Proc. of the Sixth European Soft. Eng. Conf.; Zurich, Switzerland","author":"D.S. Rosenblum","year":"1997","unstructured":"D.S. Rosenblum and A.L. Wolf. A design framework for internet-scale event observation and notification. In Proc. of the Sixth European Soft. Eng. Conf.; Zurich, Switzerland; LNCS 1301, pages 344\u2013360. Springer-Verlag, September 1997."},{"key":"12_CR15","unstructured":"B. Schneier. Applied Cryptography. John Wiley and Sons, 1996."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"C. Serban, X. Ao, and N.H. Minsky. Establishing enterprise communities. In Proc. of the 5th IEEE Intn\u2019l Enterprise Distributed Object Computing Conf. (EDOC 2001), Seattle, Washington, September 2001. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html) .","DOI":"10.1109\/EDOC.2001.950422"},{"key":"12_CR17","unstructured":"C. Serban and N.H. Minsky. Using java as a language for writing lgi-laws. Technical report, Rutgers University, July 2002."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"C. Wang, A. Carzaniga, D. Evans, and A.L. Wolf. Security issues and requirements for Internet-scale publish-subscribe systems. In Proc. of the 35th Annual Hawaii Intn\u2019l Conf. on System Sciences, Hawaii, January 2002.","DOI":"10.1109\/HICSS.2002.994531"}],"container-title":["Lecture Notes in Computer Science","Middleware 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44892-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T11:33:56Z","timestamp":1737372836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44892-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403173","9783540448921"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44892-6_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}