{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:24:03Z","timestamp":1751495043462,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T00:00:00Z","timestamp":1544400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,10]]},"DOI":"10.1145\/3286719.3286727","type":"proceedings-article","created":{"date-parts":[[2018,11,21]],"date-time":"2018-11-21T13:51:49Z","timestamp":1542808309000},"page":"35-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Position paper"],"prefix":"10.1145","author":[{"given":"Stevan","family":"Coroller","sequence":"first","affiliation":[{"name":"SAMOVAR, T\u00e9l\u00e9com SudParis, CNRS, Universit\u00e9 Paris-Saclay, France"}]},{"given":"Sophie","family":"Chabridon","sequence":"additional","affiliation":[{"name":"SAMOVAR, T\u00e9l\u00e9com SudParis, CNRS, Universit\u00e9 Paris-Saclay, France"}]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[{"name":"SAMOVAR, T\u00e9l\u00e9com SudParis, CNRS, Universit\u00e9 Paris-Saclay, France"}]},{"given":"Denis","family":"Conan","sequence":"additional","affiliation":[{"name":"SAMOVAR, T\u00e9l\u00e9com SudParis, CNRS, Universit\u00e9 Paris-Saclay, France"}]},{"given":"Jean","family":"Leneutre","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com ParisTech, Universit\u00e9 Paris-Saclay, France"}]}],"member":"320","published-online":{"date-parts":[[2018,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167176"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333119"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-013-0387-2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"M. Colombo A. Lazouski F. Martinelli and P. Mori. 2010. A Proposal on Enhancing XACML with Continuous Usage Control Features. In Grids P2P and Services Computing. Springer 133--146.  M. Colombo A. Lazouski F. Martinelli and P. Mori. 2010. A Proposal on Enhancing XACML with Continuous Usage Control Features. In Grids P2P and Services Computing. Springer 133--146.","DOI":"10.1007\/978-1-4419-6794-7_11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33260-9_5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183342"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543583"},{"volume-title":"Int. Conf. on Security, Privacy, and Anonymity in Computation, Communication, and Storage. 545--560","author":"La Marra A.","key":"e_1_3_2_1_9_1","unstructured":"A. La Marra , F. Martinelli , P. Mori , A. Rizos , and A. Saracino . 2017. Improving MQTT by Inclusion of Usage Control . In Int. Conf. on Security, Privacy, and Anonymity in Computation, Communication, and Storage. 545--560 . A. La Marra, F. Martinelli, P. Mori, A. Rizos, and A. Saracino. 2017. Improving MQTT by Inclusion of Usage Control. In Int. Conf. on Security, Privacy, and Anonymity in Computation, Communication, and Storage. 545--560."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"A. La Marra F. Martinelli P. Mori and A. Saracino. 2017. Implementing Usage Control in Internet of Things: A Smart Home Use Case. IEEE Trustcom\/BigDataSE\/ICESS (2017) 1056--1063.  A. La Marra F. Martinelli P. Mori and A. Saracino. 2017. Implementing Usage Control in Internet of Things: A Smart Home Use Case. IEEE Trustcom\/BigDataSE\/ICESS (2017) 1056--1063.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"A. Lazouski F. Martinelli and P. Mori. 2012. A Prototype for Enforcing Usage Control Policies Based on XACML. In Trust Privacy and Security in Digital Business. Springer 79--92.  A. Lazouski F. Martinelli and P. Mori. 2012. A Prototype for Enforcing Usage Control Policies Based on XACML. In Trust Privacy and Security in Digital Business. Springer 79--92.","DOI":"10.1007\/978-3-642-32287-7_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940296"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.225"},{"volume-title":"Proceedings of the Eighth Real-Time Linux Workshop.","author":"Pohlack M.","key":"e_1_3_2_1_16_1","unstructured":"M. Pohlack , B. D\u00f6bel , and A. Lackorzy\u0144ski . 2006. Towards Runtime Monitoring in Real-Time Systems . In Proceedings of the Eighth Real-Time Linux Workshop. M. Pohlack, B. D\u00f6bel, and A. Lackorzy\u0144ski. 2006. Towards Runtime Monitoring in Real-Time Systems. In Proceedings of the Eighth Real-Time Linux Workshop."},{"volume-title":"IFIP SEC 2009, 24th Int. Information Security Conference. Pafos, CYPRUS.","author":"Shikfa A.","key":"e_1_3_2_1_17_1","unstructured":"A. Shikfa , M. \u00d6nen , and R. Molva . 2009. Privacy-preserving content-based publish\/subscribe networks . In IFIP SEC 2009, 24th Int. Information Security Conference. Pafos, CYPRUS. A. Shikfa, M. \u00d6nen, and R. Molva. 2009. Privacy-preserving content-based publish\/subscribe networks. In IFIP SEC 2009, 24th Int. Information Security Conference. Pafos, CYPRUS."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988349"}],"event":{"name":"Middleware '18: 19th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP International Federation for Information Processing"],"location":"Rennes France","acronym":"Middleware '18"},"container-title":["Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286719.3286727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286719.3286727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:12Z","timestamp":1750207452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286719.3286727"}},"subtitle":["Towards End-to-end Privacy for Publish\/Subscribe Architectures in the Internet of Things"],"short-title":[],"issued":{"date-parts":[[2018,12,10]]},"references-count":18,"alternative-id":["10.1145\/3286719.3286727","10.1145\/3286719"],"URL":"https:\/\/doi.org\/10.1145\/3286719.3286727","relation":{},"subject":[],"published":{"date-parts":[[2018,12,10]]},"assertion":[{"value":"2018-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}