{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:01Z","timestamp":1750307401483,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:00:00Z","timestamp":1277683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,28]]},"DOI":"10.1145\/1815396.1815557","type":"proceedings-article","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T13:05:15Z","timestamp":1277816715000},"page":"701-705","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A role-based protocol for secure multicast communications in mobile ad hoc networks"],"prefix":"10.1145","author":[{"given":"Ezedin E.","family":"Barka","sequence":"first","affiliation":[{"name":"UAE University, Al Ain, UAE"}]},{"given":"Yasser","family":"Gadallah","sequence":"additional","affiliation":[{"name":"UAE University, Al Ain, UAE"}]}],"member":"320","published-online":{"date-parts":[[2010,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","volume-title":"IEEE Symp. Net. and Distributed System Security","author":"Ballardie T.","year":"1995","unstructured":"T. Ballardie and J. Crowcroft , \" Multicast-specific security threats and countermeasures,\" Proc . IEEE Symp. Net. and Distributed System Security , pp. 2 -- 16 , 1995 . T. Ballardie and J. Crowcroft, \"Multicast-specific security threats and countermeasures,\" Proc. IEEE Symp. Net. and Distributed System Security, pp. 2--16, 1995."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.023"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383064"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339337"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52331"},{"key":"e_1_3_2_1_6_1","first-page":"687","volume-title":"Symp. Comp. Commun. (ISCC)","author":"Hardjono T.","year":"2000","unstructured":"T. Hardjono , \"Router-assistance for receiver access control in PIM-SM.\" Proc. IEEE Int'l . Symp. Comp. Commun. (ISCC) , Antibes, France , pp. 687 -- 692 , July 2000 . T. Hardjono, \"Router-assistance for receiver access control in PIM-SM.\" Proc. IEEE Int'l. Symp. Comp. Commun. (ISCC), Antibes, France, pp. 687--692, July 2000."},{"key":"e_1_3_2_1_7_1","first-page":"1547","volume-title":"Gothic: a group access control architecture for secure multicast and anycast,\" IEEE INFOCOM","author":"Judge P.","year":"2002","unstructured":"P. Judge and M. Ammar , \" Gothic: a group access control architecture for secure multicast and anycast,\" IEEE INFOCOM , New York , pp. 1547 -- 1556 , June 2002 . P. Judge and M. Ammar, \"Gothic: a group access control architecture for secure multicast and anycast,\" IEEE INFOCOM, New York, pp. 1547--56, June 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498567"},{"key":"e_1_3_2_1_9_1","volume-title":"conjunction with the 17th International Conference on Parallel and Distributed Computing Systems (PDCS)","author":"Nita-Rotaru C.","year":"2004","unstructured":"C. Nita-Rotaru and N. LI , \"A framework for role-based access control in group communication systems,\" The 2004 International Workshop on Security in Parallel and Distributed Systems . In conjunction with the 17th International Conference on Parallel and Distributed Computing Systems (PDCS) , San Francisco , CA , September 2004 . C. Nita-Rotaru and N. LI, \"A framework for role-based access control in group communication systems,\" The 2004 International Workshop on Security in Parallel and Distributed Systems. In conjunction with the 17th International Conference on Parallel and Distributed Computing Systems (PDCS), San Francisco, CA, September 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"March","author":"Pendarakis D.","year":"2001","unstructured":"D. Pendarakis , S. Shi , D. Verma , and M. Waldvogel , \" ALMI: an application level multicast infrastructure,\" Proc. of the 3rd Usenix Symposium on Internet Technologies and Systems (USITS) , March 2001 . D. Pendarakis, S. Shi, D. Verma, and M. Waldvogel, \"ALMI: an application level multicast infrastructure,\" Proc. of the 3rd Usenix Symposium on Internet Technologies and Systems (USITS), March 2001."},{"key":"e_1_3_2_1_11_1","volume-title":"August","author":"Sandhu R.","year":"1997","unstructured":"R. Sandhu and V. Bhamidipati , \" Role-based administration of user-role assignment: the UR97 model and its Oracle implementation,\" Proc. of IFIP WG11.3 Workshop on Data Security , August 1997 . R. Sandhu and V. Bhamidipati, \"Role-based administration of user-role assignment: the UR97 model and its Oracle implementation,\" Proc. of IFIP WG11.3 Workshop on Data Security, August 1997."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_14_1","first-page":"141","volume-title":"Eds.","author":"Wang N.","year":"2001","unstructured":"N. Wang and G. Pavlou , \" Scalable IP multicast sender access control for bi-directional trees,\" Proc. of the 3rd Int'l. Wksp. Networked Group Commun. (NGC'2001), London, J. Crowcroft, M. Hofmann , Eds. , Springer , pp. 141 -- 158 , Nov. 2001 . N. Wang and G. Pavlou, \"Scalable IP multicast sender access control for bi-directional trees,\" Proc. of the 3rd Int'l. Wksp. Networked Group Commun. (NGC'2001), London, J. Crowcroft, M. Hofmann, Eds., Springer, pp. 141--158, Nov. 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313538"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.04.003"}],"event":{"name":"IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference","sponsor":["Computer and Information Society","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Caen France","acronym":"IWCMC '10"},"container-title":["Proceedings of the 6th International Wireless Communications and Mobile Computing Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815557","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1815396.1815557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:23Z","timestamp":1750246763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,28]]},"references-count":16,"alternative-id":["10.1145\/1815396.1815557","10.1145\/1815396"],"URL":"https:\/\/doi.org\/10.1145\/1815396.1815557","relation":{},"subject":[],"published":{"date-parts":[[2010,6,28]]},"assertion":[{"value":"2010-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}