{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:32Z","timestamp":1725562772268},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_23","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"319-326","source":"Crossref","is-referenced-by-count":0,"title":["When ABE Meets RSS"],"prefix":"10.1007","author":[{"given":"Yu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hyun Sung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jianbin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1113378.1113379","volume":"3","author":"S.J. Cold","year":"2006","unstructured":"Cold, S.J.: Using really simple syndication (rss) to enhance student research. SIGITE Newsl.\u00a03, 6\u20139 (2006)","journal-title":"SIGITE Newsl."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Glotzbach, R.J., Mohler, J.L., Radwan, J.E.: Rss as a course information delivery method. In: ACM SIGGRAPH 2007 educators program, pp. 16\u201321 (2007)","DOI":"10.1145\/1282040.1282057"},{"key":"23_CR3","unstructured":"Gregorio, J.: Secure rss syndication (2005), http:\/\/www.xml.com\/pub\/a\/2005\/07\/13\/secure-rss.html"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/b102082","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A. Sahai","year":"2004","unstructured":"Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 457\u2013473. Springer, Heidelberg (2004)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS 2006, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM 2009 conference on Data communication, pp. 135\u2013146 (2009)","DOI":"10.1145\/1592568.1592585"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Halevy","year":"2002","unstructured":"Halevy, D., Shamir, A.: The lsd broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 47\u201360. Springer, Heidelberg (2002)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 258\u2013275. Springer, Heidelberg (2005)"},{"key":"23_CR10","unstructured":"IETF: The atom publishing protocol, http:\/\/www.atomenabled.org\/developers\/protocol\/atom-protocol-spec.php"},{"key":"23_CR11","unstructured":"Imamura, T., Dillaway, B., Simon, E.: XML Encryption Syntax and Processing (December 2002), http:\/\/www.w3.org\/TR\/xmlenc-core\/"},{"key":"23_CR12","unstructured":"Advanced crypto software collection, http:\/\/acsc.csl.sri.com\/cpabe"},{"key":"23_CR13","unstructured":"Grossman, J.: The origins of cross-site scripting, xss (2008)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:34Z","timestamp":1606185754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}