{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:10:06Z","timestamp":1725570606289},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_16","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:45:07Z","timestamp":1291117507000},"page":"201-220","source":"Crossref","is-referenced-by-count":3,"title":["Towards a Cryptographic Treatment of Publish\/Subscribe Systems"],"prefix":"10.1007","author":[{"given":"Tsz Hon","family":"Yuen","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Department of Computer Science, Israel Institute of Technology (1996)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Khurana, H.: Scalable security and accounting services for content-based publish\/subscribe systems. In: Haddad, H., Liebrock, L.M., Omicini, A., Wainwright, R.L. (eds.) SAC 2005, pp. 801\u2013807. ACM, New York (2005)","DOI":"10.1145\/1066677.1066862"},{"key":"16_CR4","unstructured":"Li, J., Lu, C., Shi, W.: An efficient scheme for preserving confidentiality in content-based publish-subscribe systems, Tech. Rep. GIT-CC-04-01, Georgia Institute of Technology (2004)"},{"key":"16_CR5","unstructured":"Miyazaki, K., Susaki, S., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H.: Digital documents sanitizing problem. IEICE Technical Report ISEC2003-20, 61\u201367 (2003)"},{"key":"16_CR6","unstructured":"Nikander, P., Giannis, M.F.: Towards understanding pure publish\/subscribe cryptographic protocols. In: 16th International Workshop on Security Protocols (2008)"},{"key":"16_CR7","series-title":"ACM International Conference Proceeding Series","first-page":"104","volume-title":"DEBS 2007","author":"L.I.W. Pesonen","year":"2007","unstructured":"Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Encryption-enforced access control in dynamic multi-domain publish\/subscribe networks. In: DEBS 2007. ACM International Conference Proceeding Series, vol.\u00a0233, pp. 104\u2013115. ACM, New York (2007)"},{"key":"16_CR8","volume-title":"Securecomm 2006","author":"C. Raiciu","year":"2006","unstructured":"Raiciu, C., Rosenblum, D.S.: Enabling confidentiality in content-based publish\/subscribe infrastructures. In: Securecomm 2006. IEEE, Los Alamitos (2006)"},{"key":"16_CR9","first-page":"22","volume-title":"ICDCS 2007","author":"M. Srivatsa","year":"2007","unstructured":"Srivatsa, M., Liu, L.: Secure event dissemination in publish-subscribe networks. In: ICDCS 2007, p. 22. IEEE Computer Society, Los Alamitos (2007)"},{"key":"16_CR10","unstructured":"Suzuki, M., Isshiki, T., Tanaka, K.: Sanitizable signature with secret information. In: Symposium on Cryptography and Information Security, 4A1-2 (2006)"},{"key":"16_CR11","volume-title":"HICSS 2002","author":"C. Wang","year":"2002","unstructured":"Wang, C., Carzaniga, A., Evans, D., Wolf, A.L.: Security issues and requirements for Internet-scale publish-subscribe systems. In: HICSS 2002. IEEE Computer Society, Los Alamitos (2002)"},{"key":"16_CR12","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Cryptology ePrint Archive, Report 2008\/290 (2008), http:\/\/eprint.iacr.org\/"},{"key":"16_CR13","first-page":"5624","volume-title":"ICC 2008","author":"H. Zhang","year":"2008","unstructured":"Zhang, H., Sharma, A., Chen, H., Jiang, G., Meng, X., Yoshihira, K.: Enabling information confidentiality in publish\/subscribe overlay services. In: ICC 2008, pp. 5624\u20135628. IEEE, Los Alamitos (2008)"},{"key":"16_CR14","first-page":"60","volume-title":"ICDCS 2006","author":"Y. Zhao","year":"2006","unstructured":"Zhao, Y., Sturman, D.C.: Dynamic access control in a content-based publish\/subscribe system with delivery guarantees. In: ICDCS 2006, p. 60. IEEE Computer Society, Los Alamitos (2006)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:33:59Z","timestamp":1559842439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}