{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:10Z","timestamp":1759092730350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T00:00:00Z","timestamp":1401062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["TP\/AN072C"],"award-info":[{"award-number":["TP\/AN072C"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000396","name":"Technology Strategy Board","doi-asserted-by":"publisher","award":["TP\/AN072C"],"award-info":[{"award-number":["TP\/AN072C"]}],"id":[{"id":"10.13039\/501100000396","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,26]]},"DOI":"10.1145\/2611286.2611310","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"246-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Policy enforcement within emerging distributed, event-based systems"],"prefix":"10.1145","author":[{"given":"Jatinder","family":"Singh","sequence":"first","affiliation":[{"name":"University of Cambridge, UK"}]},{"given":"Jean","family":"Bacon","sequence":"additional","affiliation":[{"name":"University of Cambridge, UK"}]},{"given":"David","family":"Eyers","sequence":"additional","affiliation":[{"name":"University of Otago, NZ"}]}],"member":"320","published-online":{"date-parts":[[2014,5,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_3_2_1_2_1","first-page":"93","volume-title":"LNCS 6875","author":"Bacon J.","year":"2011","unstructured":"J. Bacon , A. I. Bejan , A. R. Beresford , D. Evans , R. J. Gibbens , and K. Moody . Using Real-Time Road Traffic Data to Evaluate Congestion . In LNCS 6875 , pages 93 -- 117 . Springer , 2011 . J. Bacon, A. I. Bejan, A. R. Beresford, D. Evans, R. J. Gibbens, and K. Moody. Using Real-Time Road Traffic Data to Evaluate Congestion. In LNCS 6875, pages 93--117. Springer, 2011."},{"key":"e_1_3_2_1_3_1","volume-title":"Special Issue on Cloud Service Management, PP(99):1--14","author":"Bacon J.","year":"2014","unstructured":"J. Bacon , D. Eyers , T. Pasquier , J. Singh , I. Papagiannis , and P. Pietzuch . Information flow control for secure cloud computing. Transactions on Network and Service Management , Special Issue on Cloud Service Management, PP(99):1--14 , 2014 . J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch. Information flow control for secure cloud computing. Transactions on Network and Service Management, Special Issue on Cloud Service Management, PP(99):1--14, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"Global Health 2012","author":"Bacon J.","year":"2012","unstructured":"J. Bacon , J. Singh , D. Trossen , D. Pavel , A. Bontozoglou , N. Vastardis , K. Yang , S. Pennington , S. Clarke , and G. Jones . Personal and social communication services for health and lifestyle monitoring . In Global Health 2012 , Venice , Oct 2012 . J. Bacon, J. Singh, D. Trossen, D. Pavel, A. Bontozoglou, N. Vastardis, K. Yang, S. Pennington, S. Clarke, and G. Jones. Personal and social communication services for health and lifestyle monitoring. In Global Health 2012, Venice, Oct 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-642-30241-1_8","volume-title":"The Future Internet","author":"Ben Hamida A.","year":"2012","unstructured":"A. Ben Hamida , F. Kon , G. Ansaldi Oliva , C. E. M. Dos Santos , J.-P. Lorr\u00e9 , M. Autili , G. De Angelis , A. Zarras , N. Georgantas , V. Issarny , and A. Bertolino . The Future Internet , chapter An Integrated Development and Runtime Environment for the Future Internet, pages 81 -- 92 . Springer-Verlag , Berlin, Heidelberg , 2012 . A. Ben Hamida, F. Kon, G. Ansaldi Oliva, C. E. M. Dos Santos, J.-P. Lorr\u00e9, M. Autili, G. De Angelis, A. Zarras, N. Georgantas, V. Issarny, and A. Bertolino. The Future Internet, chapter An Integrated Development and Runtime Environment for the Future Internet, pages 81--92. Springer-Verlag, Berlin, Heidelberg, 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.06.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25821-3_21"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.476505"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0260-8"},{"key":"e_1_3_2_1_11_1","volume-title":"Internet Engineering Task Force","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen . The TLS Protocol (RFC 2246) . Internet Engineering Task Force , 1999 . T. Dierks and C. Allen. The TLS Protocol (RFC 2246). Internet Engineering Task Force, 1999."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1667062.1667064"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"A Survey on Service Composition Middleware","volume":"1","author":"Ibrahim N.","year":"2009","unstructured":"N. Ibrahim and F. Le Mou\u00ebl . A Survey on Service Composition Middleware in Pervasive Environments. International Journal of Computer Science Issues , 1 : 1 -- 12 , Aug 2009 . N. Ibrahim and F. Le Mou\u00ebl. A Survey on Service Composition Middleware in Pervasive Environments. International Journal of Computer Science Issues, 1:1--12, Aug 2009.","journal-title":"Pervasive Environments. International Journal of Computer Science Issues"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1619258.1619285"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1039"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/508448.508470"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28169-3_5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/3-540-36162-6_2","volume-title":"Advanced Lectures on Networking","author":"Mascolo C.","year":"2002","unstructured":"C. Mascolo , L. Capra , and W. Emmerich . Advanced Lectures on Networking , chapter Mobile Computing Middleware, pages 20 -- 58 . Springer , 2002 . C. Mascolo, L. Capra, and W. Emmerich. Advanced Lectures on Networking, chapter Mobile Computing Middleware, pages 20--58. Springer, 2002."},{"key":"e_1_3_2_1_19_1","first-page":"20","volume-title":"Policy-Driven Tailoring of Sensor Networks","author":"Matthys N.","year":"2010","unstructured":"N. Matthys , C. Huygens , D. Hughes , J. Ueyama , S. Michiels , and W. Joosen . Policy-Driven Tailoring of Sensor Networks . In Springer , Sensor Systems and Software, S-CUBE'10, pages 20 -- 35 , 2010 . N. Matthys, C. Huygens, D. Hughes, J. Ueyama, S. Michiels, and W. Joosen. Policy-Driven Tailoring of Sensor Networks. In Springer, Sensor Systems and Software, S-CUBE'10, pages 20--35, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/352591.352592"},{"key":"e_1_3_2_1_21_1","volume-title":"Distributed Event-Based Systems","author":"M\u00fchl G.","year":"2006","unstructured":"G. M\u00fchl , L. Fiege , and P. Pietzuch . Distributed Event-Based Systems . Springer-Verlag , New York , 2006 . G. M\u00fchl, L. Fiege, and P. Pietzuch. Distributed Event-Based Systems. Springer-Verlag, New York, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.08.006"},{"key":"e_1_3_2_1_23_1","volume-title":"A survey of adaptive middleware","author":"Sadjadi S. M.","year":"2003","unstructured":"S. M. Sadjadi and P. K. McKinley . A survey of adaptive middleware . Michigan State University Report MSU-CSE- 03-35, 2003 . S. M. Sadjadi and P. K. McKinley. A survey of adaptive middleware. Michigan State University Report MSU-CSE-03-35, 2003."},{"key":"e_1_3_2_1_25_1","first-page":"502","volume-title":"Governance in patient-centric healthcare. In i-Society","author":"Singh J.","year":"2010","unstructured":"J. Singh and J. Bacon . Governance in patient-centric healthcare. In i-Society , pages 502 -- 509 , 2010 . J. Singh and J. Bacon. Governance in patient-centric healthcare. In i-Society, pages 502--509, 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"Journal of Internet Services and Applications (to appear)","author":"Singh J.","year":"2014","unstructured":"J. Singh and J. Bacon . On middleware for emerging health services . In Journal of Internet Services and Applications (to appear) , 2014 . J. Singh and J. Bacon. On middleware for emerging health services. In Journal of Internet Services and Applications (to appear), 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2002259.2002283"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.10"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-008-9135-x"},{"key":"e_1_3_2_1_33_1","first-page":"368","volume-title":"ACM\/IFIP\/USENIX Middleware","author":"Wun A.","year":"2007","unstructured":"A. Wun and H.-A. Jacobsen . A Policy Management Framework for Content-Based Publish\/Subscribe . In ACM\/IFIP\/USENIX Middleware 2007 , Springer LNCS 4834, pages 368 -- 388 , 2007. A. Wun and H.-A. Jacobsen. A Policy Management Framework for Content-Based Publish\/Subscribe. In ACM\/IFIP\/USENIX Middleware 2007, Springer LNCS 4834, pages 368--388, 2007."}],"event":{"name":"DEBS '14: The 8th ACM International Conference on Distributed Event-Based Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Mumbai India","acronym":"DEBS '14"},"container-title":["Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611286.2611310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2611286.2611310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:04Z","timestamp":1750229764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611286.2611310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,26]]},"references-count":31,"alternative-id":["10.1145\/2611286.2611310","10.1145\/2611286"],"URL":"https:\/\/doi.org\/10.1145\/2611286.2611310","relation":{},"subject":[],"published":{"date-parts":[[2014,5,26]]},"assertion":[{"value":"2014-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}