{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:08Z","timestamp":1750308788677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T00:00:00Z","timestamp":1278892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,7,12]]},"DOI":"10.1145\/1827418.1827425","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T13:31:10Z","timestamp":1278941470000},"page":"38-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Providing basic security mechanisms in broker-less publish\/subscribe systems"],"prefix":"10.1145","author":[{"given":"Muhammad Adnan","family":"Tariq","sequence":"first","affiliation":[{"name":"University of Stuttgart"}]},{"given":"Boris","family":"Koldehofe","sequence":"additional","affiliation":[{"name":"University of Stuttgart"}]},{"given":"Ala'","family":"Altaweel","sequence":"additional","affiliation":[{"name":"University of Stuttgart"}]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[{"name":"University of Stuttgart"}]}],"member":"320","published-online":{"date-parts":[[2010,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_2_1_4_1","volume-title":"4th theory of Cryptography Conf.","author":"Boneh D.","year":"2007","unstructured":"D. Boneh and B. Waters . Conjunctive, subset, and range queries on encrypted data . In 4th theory of Cryptography Conf. , 2007 . D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In 4th theory of Cryptography Conf., 2007."},{"key":"e_1_3_2_1_5_1","first-page":"7","article-title":"Spine: Adaptive publish\/subscribe for wireless mesh networks","author":"Briones J. A.","year":"2009","unstructured":"J. A. Briones , B. Koldehofe , and K. Rothermel . Spine: Adaptive publish\/subscribe for wireless mesh networks . Studia Informatika Universalis , 7 , 2009 . J. A. Briones, B. Koldehofe, and K. Rothermel. Spine: Adaptive publish\/subscribe for wireless mesh networks. Studia Informatika Universalis, 7, 2009.","journal-title":"Studia Informatika Universalis"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11549468_130"},{"key":"e_1_3_2_1_8_1","volume-title":"Spontaneous virtual networks: On the road towards the internet's next generation. it - Information Technology","author":"T. S. Consortium","year":"2008","unstructured":"T. S. Consortium . Spontaneous virtual networks: On the road towards the internet's next generation. it - Information Technology , 2008 . T. S. Consortium. Spontaneous virtual networks: On the road towards the internet's next generation. it - Information Technology, 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Jelasity A. Montresor G. P. Jesi and S. Voulgaris. PeerSim: A Peer-to-Peer Simulator. http:\/\/peersim.sourceforge.net\/.  M. Jelasity A. Montresor G. P. Jesi and S. Voulgaris. PeerSim: A Peer-to-Peer Simulator. http:\/\/peersim.sourceforge.net\/."},{"key":"e_1_3_2_1_12_1","unstructured":"B. Lynn. The pairing-based cryptography (pbc) library. http:\/\/crypto.stanford.edu\/pbc\/.  B. Lynn. The pairing-based cryptography (pbc) library. http:\/\/crypto.stanford.edu\/pbc\/."},{"key":"e_1_3_2_1_13_1","volume-title":"Infrastructure-less content-based publish\/subscribe. Technical report","author":"Muthusamy V.","year":"2007","unstructured":"V. Muthusamy and H.-A. Jacobsen . Infrastructure-less content-based publish\/subscribe. Technical report , Middleware Systems Research Group , University of Toronto, 2007 . V. Muthusamy and H.-A. Jacobsen. Infrastructure-less content-based publish\/subscribe. Technical report, Middleware Systems Research Group, University of Toronto, 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"conf. on USENIX Security Symposium","author":"Opyrchal L.","year":"2001","unstructured":"L. Opyrchal and A. Prakash . Secure distribution of events in content-based publish subscribe systems . In conf. on USENIX Security Symposium , 2001 . L. Opyrchal and A. Prakash. Secure distribution of events in content-based publish subscribe systems. In conf. on USENIX Security Symposium, 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266894.1266916"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19483"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102158"},{"key":"e_1_3_2_1_21_1","volume-title":"Scalable access control in content-based publish-subscribe systems. Technical report","author":"Srivatsa M.","year":"2006","unstructured":"M. Srivatsa and L. Liu . Scalable access control in content-based publish-subscribe systems. Technical report , Georgia Institute of Technology , 2006 d. M. Srivatsa and L. Liu. Scalable access control in content-based publish-subscribe systems. Technical report, Georgia Institute of Technology, 2006d."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1887695.1887746"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/820747.821330"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.014"}],"event":{"name":"DEBS '10: The 4th ACM International Conference on Distributed Event-based Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Cambridge United Kingdom","acronym":"DEBS '10"},"container-title":["Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1827418.1827425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1827418.1827425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:50Z","timestamp":1750278170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1827418.1827425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,12]]},"references-count":23,"alternative-id":["10.1145\/1827418.1827425","10.1145\/1827418"],"URL":"https:\/\/doi.org\/10.1145\/1827418.1827425","relation":{},"subject":[],"published":{"date-parts":[[2010,7,12]]},"assertion":[{"value":"2010-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}