{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:13Z","timestamp":1751568073766},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615653"},{"type":"electronic","value":"9783319615660"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_8","type":"book-chapter","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T22:36:53Z","timestamp":1499121413000},"page":"82-93","source":"Crossref","is-referenced-by-count":26,"title":["Flexible Synchronization Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish\/Subscribe Systems"],"prefix":"10.1007","author":[{"given":"Shigenari","family":"Nakamura","sequence":"first","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]},{"given":"Tomoya","family":"Enokido","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Takizawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"8_CR1","unstructured":"Google alert. http:\/\/www.google.com\/alerts"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Blanco, R., Alencar, P.: Event models in distributed event based systems. In: Principles and Applications of Distributed Event-Based Systems, pp. 19\u201342 (2010)","DOI":"10.4018\/978-1-60566-697-6.ch002"},{"issue":"6","key":"8_CR3","doi-asserted-by":"crossref","first-page":"2216","DOI":"10.1109\/TIE.2010.2051393","volume":"58","author":"T Enokido","year":"2011","unstructured":"Enokido, T., Takizawa, M.: Purpose-based information flow control for cyber engineering. IEEE Trans. Ind. Electron. 58(6), 2216\u20132225 (2011)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"2","key":"8_CR4","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"PT Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish\/subscribe. ACM Comput. Surv. 35(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"8_CR5","volume-title":"Role-based Access Controls","author":"DF Ferraiolo","year":"2007","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-based Access Controls, 2nd edn. Artech, Boston (2007)","edition":"2"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (rwa) based synchronization protocols to prevent illegal information flow. In: Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), pp. 120\u2013127 (2014)","DOI":"10.1109\/NBiS.2014.48"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Role-based information flow control models. In: Proceedings of IEEE the 28th International Conference on Advanced Information Networking and Applications (AINA-2014), pp. 1140\u20131147 (2014)","DOI":"10.1109\/AINA.2014.139"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Synchronization protocols to prevent illegal information flow in role-based access control systems. In: Proceedings of the 8th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2014), pp. 279\u2013286 (2014)","DOI":"10.1109\/CISIS.2014.39"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol to prevent illegal information flow. In: Proceedings of IEEE the 29th International Conference on Advanced Information Networking and Applications (AINA-2015), pp. 155\u2013162 (2015)","DOI":"10.1109\/AINA.2015.180"},{"issue":"3&4","key":"8_CR10","first-page":"263","volume":"11","author":"S Nakamura","year":"2015","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol to prevent illegal information flow among objects. J. Mobile Multimedia 11(3&4), 263\u2013280 (2015)","journal-title":"J. Mobile Multimedia"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol with sensitivity of objects to prevent illegal information flow. In: Proceedings of the 9th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2015), pp. 289\u2013296 (2015)","DOI":"10.1109\/CISIS.2015.41"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol with sensitivity of roles. In: Proceedings of the 18th International Conference on Network-Based Information Systems (NBiS-2015), pp. 132\u2013139 (2015)","DOI":"10.1109\/NBiS.2015.23"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: Role safety in a flexible read-write abortion protocol. In: Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2015), pp. 333\u2013340 (2015)","DOI":"10.1109\/BWCCA.2015.90"},{"issue":"2","key":"8_CR14","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1504\/IJAIS.2015.072139","volume":"2","author":"S Nakamura","year":"2015","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A write abortion-based protocol in role-based access control systems. Int. J. Adapt. Innovative Syst. 2(2), 142\u2013160 (2015)","journal-title":"Int. J. Adapt. Innovative Syst."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: Influential abortion probability in a flexible read-write abortion protocol. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 1\u20138 (2016)","DOI":"10.1109\/AINA.2016.155"},{"issue":"1","key":"8_CR16","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1504\/IJSSC.2016.076564","volume":"6","author":"S Nakamura","year":"2016","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion (RWA) protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43\u201353 (2016)","journal-title":"Int. J. Space-Based Situated Comput."},{"issue":"8","key":"8_CR17","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1016\/j.jcss.2014.12.020","volume":"81","author":"S Nakamura","year":"2015","unstructured":"Nakamura, S., Duolikun, D., Takizawa, M.: Read-abortion (RA) based synchronization protocols to prevent illegal information flow. J. Comput. Syst. Sci. 81(8), 1441\u20131451 (2015)","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Enokido, T., Takizawa, M.: Information flow control models in peer-to-peer publish\/subscribe systems. In: Proceedings of the 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2016), pp. 167\u2013174 (2016)","DOI":"10.1109\/CISIS.2016.122"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Enokido, T., Takizawa, M.: Subscription initialization (SI) protocol to prevent illegal information flow in peer-to-peer publish\/subscribe systems. In: Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS-2016), pp. 42\u201349 (2016)","DOI":"10.1109\/NBiS.2016.73"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Enokido, T., Takizawa, M.: Topic-based synchronization (TBS) protocols to prevent illegal information flow in peer-to-peer publish\/subscribe systems. In: Proceedings of the 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 57\u201368 (2016)","DOI":"10.1007\/978-3-319-49106-6_6"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Evaluation of protocols to prevent illegal information flow in peer-to-peer publish\/subscribe systems. In: Proc. of IEEE the 31st International Conference on Advanced Information Networking and Applications (AINA-2017), pp. 631\u2013638 (2017)","DOI":"10.1109\/AINA.2017.138"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Selective delivery of event messages in peer-to-peer topic-based publish\/subscribe systems. In: Proceedings of the 18th International Conference on Network-Based Information Systems (NBiS-2015), pp. 379\u2013386 (2015)","DOI":"10.1109\/NBiS.2015.58"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Reduction of unnecessarily ordered event messages in peer-to-peer model of topic-based publish\/subscribe systems. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 1160\u20131167 (2016)","DOI":"10.1109\/AINA.2016.152"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Setty, V., van Steen, M., Vitenberg, R., Voulgaris, S.: Poldercast: Fast, robust, and scalable architecture for P2P topic-based pub\/sub. In: Proceedings of ACM\/IFIP\/USENIX 13th International Conference on Middleware (Middleware 2012), pp. 271\u2013291 (2012)","DOI":"10.1007\/978-3-642-35170-9_14"},{"key":"8_CR25","doi-asserted-by":"crossref","DOI":"10.1002\/9781118354261","volume-title":"Publish\/Subscribe System: Design and Principles","author":"S Tarkoma","year":"2012","unstructured":"Tarkoma, S.: Publish\/Subscribe System: Design and Principles, 1st edn. Wiley, Hoboken (2012)","edition":"1"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T05:15:05Z","timestamp":1569647705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}