{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:55Z","timestamp":1750306495237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T00:00:00Z","timestamp":1448323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["FP7-ICT-257843"],"award-info":[{"award-number":["FP7-ICT-257843"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,24]]},"DOI":"10.1145\/2814576.2814805","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:03:51Z","timestamp":1448910231000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish\/Subscribe"],"prefix":"10.1145","author":[{"given":"Emanuel","family":"Onica","sequence":"first","affiliation":[{"name":"Alexandru Ioan Cuza University of Ia\u015fi, Romania"}]},{"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Switzerland"}]},{"given":"Hugues","family":"Mercier","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Switzerland"}]},{"given":"Etienne","family":"Rivi\u00e8re","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1385993"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488260"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335484.2335509"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.64"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"volume-title":"SRDS 2004, 23rd Symposium on Reliable Distributed Systems.","author":"Chand R.","key":"e_1_3_2_1_7_1","unstructured":"R. Chand and P. Felber . XNet: a reliable content based publish subscribe system . In SRDS 2004, 23rd Symposium on Reliable Distributed Systems. R. Chand and P. Felber. XNet: a reliable content based publish subscribe system. In SRDS 2004, 23rd Symposium on Reliable Distributed Systems."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880018.1880020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Choi G. Ghinita and E. Bertino. A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations. In DEXA 2010: Database and Expert Systems Applications.   S. Choi G. Ghinita and E. Bertino. A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations. In DEXA 2010: Database and Expert Systems Applications.","DOI":"10.1007\/978-3-642-15364-8_32"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_10"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_1_14_1","volume-title":"Policy-based data integration for e-health monitoring processes in a B2B environment: experiences from Canada. Journal of theoretical and applied electronic commerce research, 5(1)","author":"Eze B.","year":"2010","unstructured":"B. Eze , C. Kuziemsky , L. Peyton , G. Middleton , and A. Mouttham . Policy-based data integration for e-health monitoring processes in a B2B environment: experiences from Canada. Journal of theoretical and applied electronic commerce research, 5(1) , 2010 . B. Eze, C. Kuziemsky, L. Peyton, G. Middleton, and A. Mouttham. Policy-based data integration for e-health monitoring processes in a B2B environment: experiences from Canada. Journal of theoretical and applied electronic commerce research, 5(1), 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"volume-title":"ATC 2010: USENIX Annual Technical Conference.","author":"Hunt P.","key":"e_1_3_2_1_16_1","unstructured":"P. Hunt , M. Konar , F. P. Junqueira , and B. Reed . ZooKeeper: Wait-free coordination for internet-scale systems . In ATC 2010: USENIX Annual Technical Conference. P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. ZooKeeper: Wait-free coordination for internet-scale systems. In ATC 2010: USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866401"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.013"},{"key":"e_1_3_2_1_19_1","volume-title":"Pub.\/Sub. and Message Filtering Tech.","author":"Jacobsen H.-A.","year":"2009","unstructured":"H.-A. Jacobsen , A. Cheung , G. Lia , B. Maniymaran , V. Muthusamy , and R. S. Kazemzadeh . The PADRES publish\/subscribe system. In Handbook of Research on Adv. Dist. Event-Based Sys ., Pub.\/Sub. and Message Filtering Tech. , 2009 . H.-A. Jacobsen, A. Cheung, G. Lia, B. Maniymaran, V. Muthusamy, and R. S. Kazemzadeh. The PADRES publish\/subscribe system. In Handbook of Research on Adv. Dist. Event-Based Sys., Pub.\/Sub. and Message Filtering Tech., 2009."},{"volume-title":"GSR 2012:  12th Global Symposium for Regulators.","author":"Liston S.","key":"e_1_3_2_1_21_1","unstructured":"S. Liston . The Cloud : data protection and privacy -- Whose cloud is it anyway? In GSR 2012: 12th Global Symposium for Regulators. S. Liston. The Cloud: data protection and privacy -- Whose cloud is it anyway? In GSR 2012: 12th Global Symposium for Regulators."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453906"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295164"},{"volume-title":"EUROCRYPT 1999:  17th International Conference on Theory and Application of Cryptographic Techniques.","author":"Paillier P.","key":"e_1_3_2_1_25_1","unstructured":"P. Paillier . Public-key cryptosystems based on composite degree residuosity classes . In EUROCRYPT 1999: 17th International Conference on Theory and Application of Cryptographic Techniques. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT 1999: 17th International Conference on Theory and Application of Cryptographic Techniques."},{"volume-title":"SP 2001: IEEE Symposium on Security and Privacy.","author":"Perrig A.","key":"e_1_3_2_1_26_1","unstructured":"A. Perrig , D. Song , and J. D. Tygar . ELK, a new protocol for efficient large-group key distribution . In SP 2001: IEEE Symposium on Security and Privacy. A. Perrig, D. Song, and J. D. Tygar. ELK, a new protocol for efficient large-group key distribution. In SP 2001: IEEE Symposium on Security and Privacy."},{"volume-title":"ICDCS 2002:  22nd International Conference on Distributed Computing Systems.","author":"Pietzuch P. R.","key":"e_1_3_2_1_27_1","unstructured":"P. R. Pietzuch and J. Bacon . Hermes: A distributed event-based middleware architecture . In ICDCS 2002: 22nd International Conference on Distributed Computing Systems. P. R. Pietzuch and J. Bacon. Hermes: A distributed event-based middleware architecture. In ICDCS 2002: 22nd International Conference on Distributed Computing Systems."},{"volume-title":"Conf. on Security and Privacy in Comm. Networks.","author":"Raiciu C.","key":"e_1_3_2_1_28_1","unstructured":"C. Raiciu and D. S. Rosenblum . Enabling confidentiality in content-based publish\/subscribe infrastructures. In Securecomm 2006: 2nd Int . Conf. on Security and Privacy in Comm. Networks. C. Raiciu and D. S. Rosenblum. Enabling confidentiality in content-based publish\/subscribe infrastructures. In Securecomm 2006: 2nd Int. Conf. on Security and Privacy in Comm. Networks."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.15"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"volume-title":"PETS 2011:  11th Int. Conf. on Privacy Enhancing Technologies.","author":"Shikfa A.","key":"e_1_3_2_1_32_1","unstructured":"A. Shikfa , M. \u00d6nen , and R. Molva . Broker-based private matching . In PETS 2011: 11th Int. Conf. on Privacy Enhancing Technologies. A. Shikfa, M. \u00d6nen, and R. Molva. Broker-based private matching. In PETS 2011: 11th Int. Conf. on Privacy Enhancing Technologies."},{"key":"e_1_3_2_1_33_1","volume-title":"IBM Zurich","author":"Shoup V.","year":"2001","unstructured":"V. Shoup . A proposal for an iso standard for public key encryption. Technical report , IBM Zurich , 2001 . V. Shoup. A proposal for an iso standard for public key encryption. Technical report, IBM Zurich, 2001."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.136"},{"key":"e_1_3_2_1_36_1","volume-title":"Introduction to Linear Algebra","author":"Strang G.","year":"2009","unstructured":"G. Strang . Introduction to Linear Algebra , 4 th edition. Wellesley-Cambridge Press and SIAM , 2009 . G. Strang. Introduction to Linear Algebra, 4th edition. Wellesley-Cambridge Press and SIAM, 2009.","edition":"4"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1827418.1827425"},{"volume-title":"HICSS 2002:  35th Annual Hawaii International Conference on System Sciences.","author":"Wang C.","key":"e_1_3_2_1_38_1","unstructured":"C. Wang , A. Carzaniga , D. Evans , and A. Wolf . Security issues and requirements for internet-scale publish-subscribe systems . In HICSS 2002: 35th Annual Hawaii International Conference on System Sciences. C. Wang, A. Carzaniga, D. Evans, and A. Wolf. Security issues and requirements for internet-scale publish-subscribe systems. In HICSS 2002: 35th Annual Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"}],"event":{"name":"Middleware '15: 16th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP International Federation for Information Processing"],"location":"Vancouver BC Canada","acronym":"Middleware '15"},"container-title":["Proceedings of the 16th Annual Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814576.2814805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814576.2814805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:42Z","timestamp":1750225722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814576.2814805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,24]]},"references-count":38,"alternative-id":["10.1145\/2814576.2814805","10.1145\/2814576"],"URL":"https:\/\/doi.org\/10.1145\/2814576.2814805","relation":{},"subject":[],"published":{"date-parts":[[2015,11,24]]},"assertion":[{"value":"2015-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}