{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:38Z","timestamp":1750308758133,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T00:00:00Z","timestamp":1182297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,20]]},"DOI":"10.1145\/1266894.1266916","type":"proceedings-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T19:20:55Z","timestamp":1190748055000},"page":"104-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Encryption-enforced access control in dynamic multi-domain publish\/subscribe networks"],"prefix":"10.1145","author":[{"given":"Lauri I. W.","family":"Pesonen","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, UK"}]},{"given":"David M.","family":"Eyers","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, UK"}]},{"given":"Jean","family":"Bacon","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2007,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"J.\n       \n      Bacon D. M.\n       \n      Eyers K.\n       \n      Moody and \n      \n      \n      L. I. W.\n       \n      Pesonen\n    .\n      \n  \n   \n  Securing publish\/subscribe for multi-domain systems. In G. Alonso editor Middleware volume \n  3790\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  20\n  . \n  Springer 2005\n  .   J. Bacon D. M. Eyers K. Moody and L. I. W. Pesonen. Securing publish\/subscribe for multi-domain systems. In G. Alonso editor Middleware volume 3790 of Lecture Notes in Computer Science pages 1--20. Springer 2005.","DOI":"10.1007\/11587552_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"volume-title":"Internet Engineering Task Force","year":"1999","author":"Dierks T.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646159.680020"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"T. Iwata and I. A. Iurosawa. OMAC: One-key CBC MAC Jan. 14 2002.  T. Iwata and I. A. Iurosawa. OMAC: One-key CBC MAC Jan. 14 2002.","DOI":"10.1007\/978-3-540-39887-5_11"},{"key":"e_1_3_2_1_9_1","unstructured":"National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). Federal Information Processing Standards Publication (FIPS PUB) 197 Nov. 2001.  National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). Federal Information Processing Standards Publication (FIPS PUB) 197 Nov. 2001."},{"volume-title":"Proc. of the 10th USENIX Security Symposium. USENIX","year":"2001","author":"Opyrchal L.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108473.1108495"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2006.1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646854.708058"},{"key":"e_1_3_2_1_14_1","first-page":"202","volume-title":"Proc. of the 4th Int. Conf. on Middleware (Middleware '03)","author":"Pietzuch P. R.","year":"2003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937506"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502011"},{"key":"e_1_3_2_1_18_1","unstructured":"P. Rogaway and D. Wagner. A critique of CCM Feb. 2003.  P. Rogaway and D. Wagner. A critique of CCM Feb. 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102158"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/820747.821330"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1979.11256"},{"volume-title":"Internet Engineering Task Force","year":"2003","author":"Whiting D.","key":"e_1_3_2_1_22_1"}],"event":{"name":"DEBS07: Distributed Event-based Systems Conference","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","IEEE","ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","USENIX Assoc USENIX Assoc"],"location":"Toronto Ontario Canada","acronym":"DEBS07"},"container-title":["Proceedings of the 2007 inaugural international conference on Distributed event-based systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266894.1266916","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1266894.1266916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:25Z","timestamp":1750278145000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266894.1266916"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,20]]},"references-count":20,"alternative-id":["10.1145\/1266894.1266916","10.1145\/1266894"],"URL":"https:\/\/doi.org\/10.1145\/1266894.1266916","relation":{},"subject":[],"published":{"date-parts":[[2007,6,20]]},"assertion":[{"value":"2007-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}