{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:15:44Z","timestamp":1725981344643},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319936581"},{"type":"electronic","value":"9783319936598"}],"license":[{"start":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T00:00:00Z","timestamp":1529366400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-93659-8_9","type":"book-chapter","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T10:00:55Z","timestamp":1529316055000},"page":"102-114","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of a Protocol to Prevent Malicious Information Flow in P2PPS Systems"],"prefix":"10.1007","author":[{"given":"Shigenari","family":"Nakamura","sequence":"first","affiliation":[]},{"given":"Tomoya","family":"Enokido","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Takizawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,19]]},"reference":[{"key":"9_CR1","unstructured":"Google Alert. http:\/\/www.google.com\/alerts"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Blanco, R., Alencar, P.: Event models in distributed event based systems. In: Principles and Applications of Distributed Event-Based Systems, pp. 19\u201342 (2010)","DOI":"10.4018\/978-1-60566-697-6.ch002"},{"key":"9_CR3","unstructured":"Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Reading (1982)"},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"PT Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish\/subscribe. ACM Comput. Surv. 35(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"9_CR5","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Controls, 2nd edn. Artech (2007)"},{"issue":"7","key":"9_CR6","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of event in a distributed systems. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"issue":"3&4","key":"9_CR7","first-page":"263","volume":"11","author":"S Nakamura","year":"2015","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol to prevent illegal information flow among objects. J. Mob. Multimed. 11(3&4), 263\u2013280 (2015)","journal-title":"J. Mob. Multimed."},{"issue":"2","key":"9_CR8","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1504\/IJAIS.2015.072139","volume":"2","author":"S Nakamura","year":"2015","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A write abortion-based protocol in role-based access control systems. Int. J. Adapt. Innov. Syst. 2(2), 142\u2013160 (2015)","journal-title":"Int. J. Adapt. Innov. Syst."},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJSSC.2016.076564","volume":"6","author":"S Nakamura","year":"2016","unstructured":"Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion (RWA) protocol to prevent illegal information flow in role-based access control systems. Int. J. Space Based Situated Comput. 6(1), 43\u201353 (2016)","journal-title":"Int. J. Space Based Situated Comput."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Enokido, T., Takizawa, M.: Information flow control models in peer-to-peer publish\/subscribe systems. In: Proceedings of the 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2016), pp. 167\u2013174 (2016)","DOI":"10.1109\/CISIS.2016.122"},{"key":"9_CR11","first-page":"57","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"Shigenari Nakamura","year":"2016","unstructured":"Nakamura, S., Enokido, T., Takizawa, M.: Topic-based synchronization (TBS) protocols to prevent illegal information flow in peer-to-peer publish\/subscribe systems. In: Proceedings of the 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 57\u201368 (2016)"},{"key":"9_CR12","first-page":"138","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"Shigenari Nakamura","year":"2017","unstructured":"Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: A flexible synchronization protocol for hidden topics to prevent illegal information flow in P2PPS systems. In: Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2017), pp. 138\u2013148 (2017)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-75928-9_10","volume-title":"Advances in Internet, Data & Web Technologies","author":"Shigenari Nakamura","year":"2018","unstructured":"Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Malicious information flow in P2PPS systems. In: Proceedings of the 6th International Conference on Emerging Internet, Data, and Web Technologies (EIDWT-2018), pp. 119\u2013129 (2018)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: A protocol to prevent malicious information flow in P2PPS systems. In: Proceedings of IEEE the 32nd International Conference on Advanced Information Networking and Applications (AINA-2018) (2018, accepted)","DOI":"10.1109\/AINA.2018.00017"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Selective delivery of event messages in peer-to-peer topic-based publish\/subscribe systems. In: Proceedings of the 18th International Conference on Network-Based Information Systems (NBiS-2015), pp. 379\u2013386 (2015)","DOI":"10.1109\/NBiS.2015.58"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Reduction of unnecessarily ordered event messages in peer-to-peer model of topic-based publish\/subscribe systems. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 1160\u20131167 (2016)","DOI":"10.1109\/AINA.2016.152"},{"key":"9_CR17","first-page":"271","volume-title":"Lecture Notes in Computer Science","author":"Vinay Setty","year":"2012","unstructured":"Setty, V., van Steen, M., Vitenberg, R., Voulgaris, S.: Poldercast: Fast, robust, and scalable architecture for P2P topic-based pub\/sub. In: Proceedings of ACM\/IFIP\/USENIX 13th International Conference on Middleware (Middleware 2012), pp. 271\u2013291 (2012)"},{"key":"9_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/9781118354261","volume-title":"Publish\/Subscribe System: Design and Principles","author":"S Tarkoma","year":"2012","unstructured":"Tarkoma, S.: Publish\/Subscribe System: Design and Principles, 1st edn. Wiley, New York (2012)","edition":"1"},{"issue":"6","key":"9_CR19","doi-asserted-by":"publisher","first-page":"1716","DOI":"10.1016\/j.jcss.2011.10.019","volume":"78","author":"AB Waluyo","year":"2012","unstructured":"Waluyo, A.B., Taniar, D., Rahayu, W., Aikebaier, A., Takizawa, M., Srinivasan, B.: Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. (JCSS) 78(6), 1716\u20131736 (2012)","journal-title":"J. Comput. Syst. Sci. (JCSS)"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93659-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T11:59:06Z","timestamp":1571486346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93659-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,19]]},"ISBN":["9783319936581","9783319936598"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93659-8_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,6,19]]}}}