{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:41Z","timestamp":1742914241662,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160226"},{"type":"electronic","value":"9783642160233"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16023-3_41","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T20:41:49Z","timestamp":1284928909000},"page":"531-545","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Framework for Secure and Private P2P Publish\/Subscribe"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Bernard","sequence":"first","affiliation":[]},{"given":"Maria Gradinariu","family":"Potop-Butucaru","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Tixeuil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,20]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Aguilera, M., Strom, R., Sturman, D., Astley, M., Chandra, T.: Matching events in a content-based subscription system. In: Proceedings of the 8th ACM Symposium on Principles of Distributed Computing (PODC 1999), pp. 53\u201361 (1999)","DOI":"10.1145\/301308.301326"},{"key":"41_CR2","unstructured":"Altinel, M., Franklin, M.: Efficient filtering of XML documents for selective dissemination of information. In: Proceedings of the 26th International Conference on Very Large Databases (VLDB 2000), pp. 53\u201364 (2000)"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Anceaume, E., Datta, A.K., Gradinariu, M., Simon, G.: Publish\/Subscribe Scheme for Mobile Networks. In: Proc. of the Workshop on Principles on Mobile Computing, POMC 2002 (2002)","DOI":"10.1145\/584490.584505"},{"key":"41_CR4","unstructured":"Anceaume, E., Datta, A., Gradinariu, M., Simon, G., Virgillito, A.: A semantic overlay for self*- peer-to-peer publish subscribe. In: Proceedings of the 26th International Conference on Distributed Computing Systems, ICDCS 2006 (2006)"},{"key":"41_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/978-3-540-30469-2_39","volume-title":"On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE","author":"E. Anceaume","year":"2004","unstructured":"Anceaume, E., Friedman, R., Gradinariu, M., Roy, M.: An architecture for dynamic scalable self-managed persistent objects. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol.\u00a03291, pp. 1445\u20131462. Springer, Heidelberg (2004)"},{"key":"41_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-73940-1_1","volume-title":"Parallel Computing Technologies","author":"R. Baldoni","year":"2007","unstructured":"Baldoni, R., Bertier, M., Raynal, M., Piergiovanni, S.T.: Looking for a definition of dynamic distributed systems. In: Malyshkin, V.E. (ed.) PaCT 2007. LNCS, vol.\u00a04671, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"41_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1007\/978-3-642-05148-7_53","volume-title":"On the Move to Meaningful Internet Systems: OTM 2009","author":"R. Baldoni","year":"2009","unstructured":"Baldoni, R., Doria, L., Lodi, G., Querzoni, L.: Managing reputation in contract-based distributed systems. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009. LNCS, vol.\u00a05870, pp. 760\u2013772. Springer, Heidelberg (2009)"},{"key":"41_CR8","first-page":"1","volume-title":"DEBS 2003: Proceedings of the 2nd international workshop on Distributed event-based systems","author":"A. Belokosztolszki","year":"2003","unstructured":"Belokosztolszki, A., Eyers, D.M., Pietzuch, P.R., Bacon, J., Moody, K.: Role-based access control for publish\/subscribe middleware architectures. In: DEBS 2003: Proceedings of the 2nd international workshop on Distributed event-based systems, pp. 1\u20138. ACM, New York (2003)"},{"key":"41_CR9","unstructured":"Bharambe, A., Pang, J., Seshan, S.: Colyseus: a distributed architecture for online multiplayer games. In: NSDI 2006: Proceedings of the 3rd conference on Networked Systems Design & Implementation, pp. 12\u201312 (2006)"},{"key":"41_CR10","unstructured":"Bianchi, S., Felber, P., Potop-Butucaru, M.G.: Stabilizing distributed r-trees for peer-to-peer content routing. IEEE Transactions on Parallel and Distributed Systems 99"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Botev, J., Hohfeld, A., Schloss, H., Scholtes, I., Sturm, P., Esch, M.: The hyperverse - concepts for a federated and torrent-based \u201c3d web\u201d. Int. J. Adv. Media Commun. 2(4) (2008)","DOI":"10.1504\/IJAMC.2008.022219"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Kermarrec, A.M., Rowston, A.: Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications 20(8) (October 2002)","DOI":"10.1109\/JSAC.2002.803069"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-05118-0_13","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"M.L. Champel","year":"2009","unstructured":"Champel, M.L., Kermarrec, A.M., Scouarnec, N.L.: Fog: Fighting the achilles\u2019 heel of gossip protocols with fountain codes. In: Guerraoui, R., Petit, F. (eds.) SSS 2009. LNCS, vol.\u00a05873, pp. 180\u2013194. Springer, Heidelberg (2009)"},{"issue":"4","key":"41_CR14","first-page":"354","volume":"1","author":"C.Y. Chan","year":"2002","unstructured":"Chan, C.Y., Felber, P., Garofalakis, M., Rastogi, R.: Efficient filtering of XML documents with XPath expressions. VLDB Journal, Special Issue on XML\u00a01(4), 354\u2013379 (2002)","journal-title":"VLDB Journal, Special Issue on XML"},{"key":"41_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1007\/11549468_130","volume-title":"Euro-Par 2005 Parallel Processing","author":"R. Chand","year":"2005","unstructured":"Chand, R., Felber, P.: Semantic peer-to-peer overlays for publish\/subscribe networks. In: Cunha, J.C., Medeiros, P.D. (eds.) Euro-Par 2005. LNCS, vol.\u00a03648, pp. 1194\u20131204. Springer, Heidelberg (2005)"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Costa, P., Migliavacca, M., Picco, G., Cugola, G.: Epidemic algorithms for reliable content-based publish\/subscribe: An evaluation. In: Proc. of the 24th International Conference on Distributed Computing Systems, ICDCS 2004 (2004)","DOI":"10.1109\/ICDCS.2004.1281622"},{"key":"41_CR17","unstructured":"Diao, Y., Fischer, P., Franklin, M., To, R.: YFilter: Efficient and scalable filtering of XML documents. In: Proceedings of the 18th International Conference on Data Engineering, ICDE 2002 (2002)"},{"issue":"2","key":"41_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/354876.354877","volume":"3","author":"S. Dolev","year":"2000","unstructured":"Dolev, S., Ostrobsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Trans. Inf. Syst. Secur.\u00a03(2), 63\u201384 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Fiege, L., Zeidler, A., Buchmann, A., Darmstadt, T.: Security aspects in publish\/subscribe systems. In: Third Intl. Workshop on Distributed Event-based Systems (DEBS 2004). IEEE, Los Alamitos (2004)","DOI":"10.1049\/ic:20040381"},{"key":"41_CR20","series-title":"Basic Tools","volume-title":"Foundations of cryptography","author":"O. Goldreich","year":"2007","unstructured":"Goldreich, O.: Foundations of cryptography. Basic Tools, vol.\u00a01. Cambridge University Press, Cambridge (2007)"},{"key":"41_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-642-04355-0_25","volume-title":"Distributed Computing","author":"R. Guerraoui","year":"2009","unstructured":"Guerraoui, R., Huguenin, K., Kermarrec, A.M., Monod, M.: Brief announcement: Towards secured distributed polling in social networks. In: Keidar, I. (ed.) DISC 2009. LNCS, vol.\u00a05805, pp. 241\u2013242. Springer, Heidelberg (2009)"},{"key":"41_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-30229-2_14","volume-title":"Middleware 2004","author":"A. Gupta","year":"2004","unstructured":"Gupta, A., Sahin, O., Agrawal, D., Abbadi, A.E.: Meghdoot: Content-based publish:subscribe over p2p networks. In: Jacobsen, H.-A. (ed.) Middleware 2004. LNCS, vol.\u00a03231, pp. 254\u2013273. Springer, Heidelberg (2004)"},{"key":"41_CR23","unstructured":"Keller, J., Simon, G.: Solipsis: A massively multi-participant virtual world. In: PDPTA, pp. 262\u2013268 (2003)"},{"key":"41_CR24","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1145\/1066677.1066862","volume-title":"SAC 2005: Proceedings of the 2005 ACM symposium on Applied computing","author":"H. Khurana","year":"2005","unstructured":"Khurana, H.: Scalable security and accounting services for content-based publish\/subscribe systems. In: SAC 2005: Proceedings of the 2005 ACM symposium on Applied computing, pp. 801\u2013807. ACM, New York (2005)"},{"key":"41_CR25","doi-asserted-by":"crossref","unstructured":"Miklos, Z.: Towards an access control mechanism for wide-area publish\/subscribe systems. In: Proceedings of 22nd International Conference on Distributed Computing Systems Workshops, pp. 516\u2013521 (2002)","DOI":"10.1109\/ICDCSW.2002.1030820"},{"key":"41_CR26","first-page":"21","volume-title":"SSYM 2001: Proceedings of the 10th conference on USENIX Security Symposium","author":"L. Opyrchal","year":"2001","unstructured":"Opyrchal, L., Prakash, A.: Secure distribution of events in content-based publish subscribe systems. In: SSYM 2001: Proceedings of the 10th conference on USENIX Security Symposium, pp. 21\u201321. USENIX Association, Berkeley (2001)"},{"key":"41_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-540-89754-5_8","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"S.K. Sanadhya","year":"2008","unstructured":"Sanadhya, S.K., Sarkar, P.: New collision attacks against up to 24-step sha-2. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 91\u2013103. Springer, Heidelberg (2008)"},{"key":"41_CR28","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"2007","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, Chichester (2007)","edition":"2"},{"key":"41_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/978-3-642-05118-0_45","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"S. Serbu","year":"2009","unstructured":"Serbu, S., Riviere, E., Felber, P.: Network-friendly gossiping. In: Guerraoui, R., Petit, F. (eds.) SSS 2009. LNCS, vol.\u00a05873, pp. 655\u2013669. Springer, Heidelberg (2009)"},{"key":"41_CR30","first-page":"289","volume-title":"CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security","author":"M. Srivatsa","year":"2005","unstructured":"Srivatsa, M., Liu, L.: Securing publish-subscribe overlay services with eventguard. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security, pp. 289\u2013298. ACM, New York (2005)"},{"key":"41_CR31","first-page":"22","volume-title":"ICDCS 2007: Proceedings of the 27th International Conference on Distributed Computing Systems","author":"M. Srivatsa","year":"2007","unstructured":"Srivatsa, M., Liu, L.: Secure event dissemination in publish-subscribe networks. In: ICDCS 2007: Proceedings of the 27th International Conference on Distributed Computing Systems, p. 22. IEEE Computer Society, Washington (2007)"},{"key":"41_CR32","doi-asserted-by":"crossref","unstructured":"Syverson, P., Reed, M., Goldschlag, D.: Onion Routing access configurations. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000), vol.\u00a01, pp. 34\u201340 (2000)","DOI":"10.21236\/ADA465234"},{"key":"41_CR33","unstructured":"Voulgaris, S., Rivire, E., Kermarrec, A., van Steen, M.: Sub-2-Sub: Self-organizing content-based publish subscribe for dynamic large scale collaborative networks. In: Proceedings of the 5th International Workshop on Peer-to-Peer Systems, IPTPS 2006 (2006)"},{"key":"41_CR34","unstructured":"Wang, C., Carzaniga, A., Evans, D., Wolf, A.: Security issues and requirements for internet-scale publish-subscribe systems. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002, pp. 3940\u20133947 (January 2002)"},{"key":"41_CR35","doi-asserted-by":"crossref","unstructured":"Zhuang, S.Q., Zhao, B.Y., Joseph, A.D., Katz, R., Kubiatowicz, J.: Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination. In: Proc. of the Int. Workshop on Network and OS Support for Digital Audio and Video (2001)","DOI":"10.1145\/378344.378347"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16023-3_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:46:27Z","timestamp":1740523587000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-16023-3_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160226","9783642160233"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16023-3_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"20 September 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}