{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:14:42Z","timestamp":1765887282612,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/icde.2010.5447902","type":"proceedings-article","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T17:25:00Z","timestamp":1291829100000},"page":"944-955","source":"Crossref","is-referenced-by-count":46,"title":["A privacy-preserving approach to policy-based content dissemination"],"prefix":"10.1109","author":[{"given":"Ning","family":"Shang","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Nabeel","sequence":"additional","affiliation":[]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NVidia CUDA","year":"0","key":"ref32"},{"journal-title":"FFLAS-FFPACK Finite field linear algebra subroutines\/package","year":"0","key":"ref31"},{"key":"ref30","article-title":"Efficient exact linear algebra over GPU","author":"abshoff","year":"2008","journal-title":"SAGE Day 9 talk"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453876"},{"key":"ref11","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Eurocrypt"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.102"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2093"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/568567.568570"},{"key":"ref16","article-title":"Keystone: a group key management service","author":"wong","year":"2000","journal-title":"ICT International Conference on Telecommunications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/32.31350"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.54"},{"key":"ref28","first-page":"404","article-title":"Gaussian-Jordan elimination","author":"dummit","year":"1999","journal-title":"Abstract Algebra"},{"journal-title":"Windows cardspace","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_15"},{"journal-title":"Openid","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1145\/1527017.1527027","article-title":"Secure transactions' receipts management on mobile devices","author":"paci","year":"2009","journal-title":"Symposium on Identity and Trust on the Internet (IDtrust Symposiums) NIST"},{"year":"0","key":"ref29"},{"journal-title":"Higgins Open Source Identity Framework","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"journal-title":"Liberty alliance","year":"0","key":"ref2"},{"journal-title":"Extensible Access Control Markup Language (XACML)","year":"0","key":"ref1"},{"key":"ref9","first-page":"105","article-title":"Group key management protocols: A novel taxonomy","volume":"2","author":"challal","year":"2006","journal-title":"International Journal of Information Technology"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref22","article-title":"A privacy-preserving approach to policy-based content dissemination","author":"shang","year":"2009","journal-title":"Tech Rep CERIAS TR 2009-27"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"journal-title":"G2HEC A Genus 2 Crypto C++ Library","year":"0","author":"shang","key":"ref24"},{"journal-title":"XML in clinical research and healthcare industries","year":"0","key":"ref23"},{"journal-title":"OpenSSL The Open Source Toolkit for SSL\/TLS","year":"0","key":"ref26"},{"journal-title":"NTL A library for doing number theory","year":"0","author":"shoup","key":"ref25"}],"event":{"name":"2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)","start":{"date-parts":[[2010,3,1]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2010,3,6]]}},"container-title":["2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5443872\/5447611\/05447902.pdf?arnumber=5447902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T23:21:07Z","timestamp":1636932067000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5447902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icde.2010.5447902","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}