{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:10:54Z","timestamp":1758845454689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 05-24695CNS 07-16626"],"award-info":[{"award-number":["CNS 05-24695CNS 07-16626"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-06-1-1108N00014-07-1-1173"],"award-info":[{"award-number":["N00014-06-1-1108N00014-07-1-1173"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533093","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"262-275","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["PBES"],"prefix":"10.1145","author":[{"given":"Rakesh","family":"Bobba","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Himanshu","family":"Khurana","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Musab","family":"AlTurki","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Farhana","family":"Ashraf","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9010-x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0002-x"},{"key":"e_1_3_2_1_3_1","volume-title":"Automatic Security Assessment of Critical Cyber-Infrastructures. In Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. Springer","author":"Anwar Z.","year":"2008","unstructured":"Z. Anwar , R. Shankesi , and R. H. Campbell . Automatic Security Assessment of Critical Cyber-Infrastructures. In Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. Springer , July 2008 . Z. Anwar, R. Shankesi, and R. H. Campbell. Automatic Security Assessment of Critical Cyber-Infrastructures. In Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. Springer, July 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"RFC","author":"Arends R.","year":"2005","unstructured":"R. Arends , R. Austein , M. Larson , and D. Massey . Resource Records for the DNS Security Extensions. Technical report , RFC 4034, March 2005 . R. Arends, R. Austein, M. Larson, and D. Massey. Resource Records for the DNS Security Extensions. Technical report, RFC 4034, March 2005."},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Middleware","author":"Bacon J.","year":"2005","unstructured":"J. Bacon , D. M. Eyers , K. Moody , and L. I. W. Pesonen . Securing Publish\/Subscribe for Multi-domain Systems . In G. Alonso, editor, Middleware , volume 3790 of Lecture Notes in Computer Science , pages 1 -- 20 . Springer , 2005 . J. Bacon, D. M. Eyers, K. Moody, and L. I. W. Pesonen. Securing Publish\/Subscribe for Multi-domain Systems. In G. Alonso, editor, Middleware, volume 3790 of Lecture Notes in Computer Science, pages 1--20. Springer, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"e_1_3_2_1_7_1","first-page":"262","volume":"4","author":"Baek J.","year":"2004","unstructured":"J. Baek and Y. Zheng . Identity-Based Threshold Decryption. Proc. of PKC , 4 : 262 -- 276 , 2004 . J. Baek and Y. Zheng. Identity-Based Threshold Decryption. Proc. of PKC, 4:262--276, 2004.","journal-title":"Identity-Based Threshold Decryption. Proc. of PKC"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-Based Encryption from the Weil Pairing. Advances in Cryptology-Crypto 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19--23, 2001 , Proceedings , 2001 . D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Advances in Cryptology-Crypto 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19--23, 2001, Proceedings, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Current Status and Experience of WAMS Implementation in North America. Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005","author":"Cai J.","year":"2005","unstructured":"J. Cai , Z. Huang , J. Hauer , and K. Martin . Current Status and Experience of WAMS Implementation in North America. Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE\/PES, pages 1 -- 7 , 2005 . J. Cai, Z. Huang, J. Hauer, and K. Martin. Current Status and Experience of WAMS Implementation in North America. Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE\/PES, pages 1--7, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2006.1687815"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.328"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings","author":"Ding X.","year":"2003","unstructured":"X. Ding and G. Tsudik . Simple Identity-Based Cryptography with Mediated RSA. Topics in Cryptology, CT-RSA 2003: The Cryptographers' Track at the Rsa Conference 2003, San Francisco, CA, USA April 13--17, 2003 , Proceedings , 2003 . X. Ding and G. Tsudik. Simple Identity-Based Cryptography with Mediated RSA. Topics in Cryptology, CT-RSA 2003: The Cryptographers' Track at the Rsa Conference 2003, San Francisco, CA, USA April 13--17, 2003, Proceedings, 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.139"},{"key":"e_1_3_2_1_20_1","volume-title":"An Internet Attribute Certificate Profile for Authorization (RFC 3281). Internet Engineering Task Force","author":"Farrell S.","year":"2002","unstructured":"S. Farrell and R. Housley . An Internet Attribute Certificate Profile for Authorization (RFC 3281). Internet Engineering Task Force , Network Working Group , April , 2002 . S. Farrell and R. Housley. An Internet Attribute Certificate Profile for Authorization (RFC 3281). Internet Engineering Task Force, Network Working Group, April, 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191225"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.158"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910011"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_26_1","volume-title":"Dec.","author":"Granboulan L.","year":"2001","unstructured":"L. Granboulan . RSA hybrid encryption schemes. Technical report , Dec. 2001 . L. Granboulan. RSA hybrid encryption schemes. Technical report, Dec. 2001."},{"issue":"1","key":"e_1_3_2_1_27_1","article-title":"Security, Trust, and QoS","volume":"4","author":"Hauser C. H.","year":"2008","unstructured":"C. H. Hauser , D. E. Bakken , I. Dionysiou , K. H. Gjermundr &phis;d, V. S. Irava , J. Helkey , and A. Bose . Security, Trust, and QoS in Next-Generation Control and Communication for Large Power Systems. International Journal of System of Critical Infrastructures , 4 ( 1\/2 ), 2008 . C. H. Hauser, D. E. Bakken, I. Dionysiou, K. H. Gjermundr&phis;d, V. S. Irava, J. Helkey, and A. Bose. Security, Trust, and QoS in Next-Generation Control and Communication for Large Power Systems. International Journal of System of Critical Infrastructures, 4(1\/2), 2008.","journal-title":"Next-Generation Control and Communication for Large Power Systems. International Journal of System of Critical Infrastructures"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266442"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.35"},{"key":"e_1_3_2_1_30_1","first-page":"179","volume-title":"Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS)","author":"Kapadia A.","year":"2007","unstructured":"A. Kapadia , P. P. Tsang , and S. W. Smith . Attribute-Based Publishing with Hidden Credentials and Hidden Policies . In Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS) , pages 179 -- 192 , March 2007 . A. Kapadia, P. P. Tsang, and S. W. Smith. Attribute-Based Publishing with Hidden Credentials and Hidden Policies. In Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS), pages 179--192, March 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073819"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 3rd Annual PKI R & D WorkshopGaithers-burg: NIST","author":"Linn J.","year":"2004","unstructured":"J. Linn and M. Branchaud . An examination of asserted PKI issues and proposed alternatives . Proceedings of the 3rd Annual PKI R & D WorkshopGaithers-burg: NIST , 2004 . J. Linn and M. Branchaud. An examination of asserted PKI issues and proposed alternatives. Proceedings of the 3rd Annual PKI R & D WorkshopGaithers-burg: NIST, 2004."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.197"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"T.\n      Nishide K.\n      Yoneyama and \n      K.\n      Ohta\n  . \n  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures\n  . In S. M. Bellovin R. Gennaro A. D. Keromytis and M. Yung editors ACNS volume \n  5037\n   of \n  Lecture Notes in Computer Science pages \n  111\n  --\n  129 June \n  2008\n  .   T. Nishide K. Yoneyama and K. Ohta. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. In S. M. Bellovin R. Gennaro A. D. Keromytis and M. Yung editors ACNS volume 5037 of Lecture Notes in Computer Science pages 111--129 June 2008.","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"e_1_3_2_1_36_1","volume-title":"Domain-Based Authentication of Identity-Based Cryptosystems for Secure Email and IPsec. In 12th Usenix Security Symposium, Washington, D.C.","author":"Smetters D. K.","year":"2003","unstructured":"D. K. Smetters and G. Durfee . Domain-Based Authentication of Identity-Based Cryptosystems for Secure Email and IPsec. In 12th Usenix Security Symposium, Washington, D.C. , August 2003 . D. K. Smetters and G. Durfee. Domain-Based Authentication of Identity-Based Cryptosystems for Secure Email and IPsec. In 12th Usenix Security Symposium, Washington, D.C., August 2003."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_22"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.136"},{"key":"e_1_3_2_1_39_1","series-title":"IFIP","first-page":"445","volume-title":"High-Integrity Security Retrofit for Legacy SCADA Systems","author":"Tsang P. P.","year":"2008","unstructured":"P. P. Tsang and S. W. Smith . YASIR: A Low-Latency , High-Integrity Security Retrofit for Legacy SCADA Systems . In S. Jajodia, P. Samarati, and S. Cimato, editors, SEC, volume 278 of IFIP , pages 445 -- 459 . Springer , 2008 . P. P. Tsang and S. W. Smith. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. In S. Jajodia, P. Samarati, and S. Cimato, editors, SEC, volume 278 of IFIP, pages 445--459. Springer, 2008."},{"key":"e_1_3_2_1_40_1","volume-title":"Final Report on the","author":"S.","year":"2003","unstructured":"U. S. -Canada Power System Outage Task Force . Final Report on the August 14, 2003 Blackout in the United States and Canada : Causes and Recommendations, April 2004. U.S.-Canada Power System Outage Task Force. Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, April 2004."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSE.2008.018132"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_11"}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533093"}},"subtitle":["a policy based encryption system with application to data sharing in the power grid"],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":41,"alternative-id":["10.1145\/1533057.1533093","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533093","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}