{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:41Z","timestamp":1750307681677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582402","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"101-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing hierarchical multicast communications using roles"],"prefix":"10.1145","author":[{"given":"Ezedin E.","family":"Barka","sequence":"first","affiliation":[{"name":"United Arab Emirates University, AL Ain, United Arab Emirates"}]},{"given":"Emad Eldin","family":"Mohamed","sequence":"additional","affiliation":[{"name":"United Arab Emirates University, AL Ain, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","volume-title":"IEEE Symp. Net. and Distributed System Security","author":"Ballardie T.","year":"1995","unstructured":"T. Ballardie and J. Crowcroft , \" Multicast-specific security threats and countermeasures,\" Proc . IEEE Symp. Net. and Distributed System Security , pp. 2 -- 16 , 1995 . T. Ballardie and J. Crowcroft, \"Multicast-specific security threats and countermeasures,\" Proc. IEEE Symp. Net. and Distributed System Security, pp. 2--16, 1995."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.023"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383064"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339337"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52331"},{"key":"e_1_3_2_1_6_1","first-page":"687","volume-title":"Symp. Comp. Commun. (ISCC)","author":"Hardjono T.","year":"2000","unstructured":"T. Hardjono , \"Router-assistance for receiver access control in PIM-SM.\" Proc. IEEE Int'l . Symp. Comp. Commun. (ISCC) , Antibes, France , pp. 687 -- 692 , July 2000 . T. Hardjono, \"Router-assistance for receiver access control in PIM-SM.\" Proc. IEEE Int'l. Symp. Comp. Commun. (ISCC), Antibes, France, pp. 687--692, July 2000."},{"key":"e_1_3_2_1_7_1","first-page":"1547","volume-title":"Gothic: a group access control architecture for secure multicast and anycast,\" IEEE INFOCOM","author":"Judge P.","year":"2002","unstructured":"P. Judge and M. Ammar , \" Gothic: a group access control architecture for secure multicast and anycast,\" IEEE INFOCOM , New York , pp. 1547 -- 1556 , June 2002 . P. Judge and M. Ammar, \"Gothic: a group access control architecture for secure multicast and anycast,\" IEEE INFOCOM, New York, pp. 1547--56, June 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498567"},{"key":"e_1_3_2_1_9_1","volume-title":"conjunction with the 17th International Conference on Parallel and Distributed Computing Systems (PDCS)","author":"Nita-Rotaru C.","year":"2004","unstructured":"C. Nita-Rotaru and N. LI , \"A framework for role-based access control in group communication systems,\" The 2004 International Workshop on Security in Parallel and Distributed Systems . In conjunction with the 17th International Conference on Parallel and Distributed Computing Systems (PDCS) , San Francisco , CA , September 2004 . C. Nita-Rotaru and N. LI, \"A framework for role-based access control in group communication systems,\" The 2004 International Workshop on Security in Parallel and Distributed Systems. In conjunction with the 17th International Conference on Parallel and Distributed Computing Systems (PDCS), San Francisco, CA, September 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"March","author":"Pendarakis D.","year":"2001","unstructured":"D. Pendarakis , S. Shi , D. Verma , and M. Waldvogel , \" ALMI: an application level multicast infrastructure,\" Proc. of the 3rd Usenix Symposium on Internet Technologies and Systems (USITS) , March 2001 . D. Pendarakis, S. Shi, D. Verma, and M. Waldvogel, \"ALMI: an application level multicast infrastructure,\" Proc. of the 3rd Usenix Symposium on Internet Technologies and Systems (USITS), March 2001."},{"key":"e_1_3_2_1_11_1","volume-title":"August","author":"Sandhu R.","year":"1997","unstructured":"R. Sandhu and V. Bhamidipati , \" Role-based administration of user-role assignment: the UR97 model and its Oracle implementation,\" Proc. of IFIP WG11.3 Workshop on Data Security , August 1997 . R. Sandhu and V. Bhamidipati, \"Role-based administration of user-role assignment: the UR97 model and its Oracle implementation,\" Proc. of IFIP WG11.3 Workshop on Data Security, August 1997."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_14_1","first-page":"141","volume-title":"Eds.","author":"Wang N.","year":"2001","unstructured":"N. Wang and G. Pavlou , \" Scalable IP multicast sender access control for bi-directional trees,\" Proc. of the 3rd Int'l. Wksp. Networked Group Commun. (NGC'2001), London, J. Crowcroft, M. Hofmann , Eds. , Springer , pp. 141 -- 158 , Nov. 2001 . N. Wang and G. Pavlou, \"Scalable IP multicast sender access control for bi-directional trees,\" Proc. of the 3rd Int'l. Wksp. Networked Group Commun. (NGC'2001), London, J. Crowcroft, M. Hofmann, Eds., Springer, pp. 141--158, Nov. 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.04.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.10.003"}],"event":{"name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Leipzig Germany","acronym":"IWCMC '09"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:46Z","timestamp":1750253386000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":16,"alternative-id":["10.1145\/1582379.1582402","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582402","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}