Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe
暂无分享,去创建一个
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Christof Fetzer,et al. StreamHub: a massively parallel architecture for high-performance content-based publish/subscribe , 2013, DEBS '13.
[3] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[4] Liam Peyton,et al. Policy-based Data Integration for e-Health Monitoring Processes in a B2B Environment: Experiences from Canada , 2010, J. Theor. Appl. Electron. Commer. Res..
[5] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[6] Hans-Arno Jacobsen,et al. Load Balancing Content-Based Publish/Subscribe Systems , 2010, TOCS.
[7] Bruno Crispo,et al. An implementation of event and filter confidentiality in pub/sub systems and its application to e-health , 2010, CCS '10.
[8] David S. Rosenblum,et al. Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures , 2006, 2006 Securecomm and Workshops.
[9] David M. Eyers,et al. Access control in publish/subscribe systems , 2008, DEBS.
[10] Reza Sherafat Kazemzadeh,et al. The PADRES Publish/Subscribe System , 2010, Principles and Applications of Distributed Event-Based Systems.
[11] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[12] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[13] Mudhakar Srivatsa,et al. Secure Event Dissemination in Publish-Subscribe Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[14] Elisa Bertino,et al. A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations , 2010, DEXA.
[15] Pascal Felber,et al. Thrifty privacy: efficient support for privacy-preserving publish/subscribe , 2012, DEBS.
[16] Thomas S. Heinze,et al. Elastic Scaling of a High-Throughput Content-Based Publish/Subscribe Engine , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[17] Valerio Schiavoni,et al. WHISPER: Middleware for Confidential Communication in Large-Scale Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.
[18] Bruno Crispo,et al. Design and implementation of a confidentiality and access control solution for publish/subscribe systems , 2012, Comput. Networks.
[19] Pascal Felber,et al. XNET: a reliable content-based publish/subscribe system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[20] Giovanni Di Crescenzo,et al. Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model , 2013, DPM/SETOP.
[21] Serge Lang. Introduction to Linear Algebra 2nd edition , 1970 .
[22] Refik Molva,et al. Broker-Based Private Matching , 2011, PETS.
[23] Elisa Bertino,et al. Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.
[24] Jun Li,et al. An Efficient Scheme for Preserving Confidentiality in Content-Based Publish-Subscribe Systems , 2004 .
[25] David S. Rosenblum,et al. Design and evaluation of a wide-area event notification service , 2001, TOCS.
[26] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[27] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.
[28] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[29] Nathaniel E. Helwig,et al. An Introduction to Linear Algebra , 2006 .
[30] Kurt Rothermel,et al. Providing basic security mechanisms in broker-less publish/subscribe systems , 2010, DEBS '10.
[31] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[32] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[33] Peter R. Pietzuch,et al. Hermes: a distributed event-based middleware architecture , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[34] Mahadev Konar,et al. ZooKeeper: Wait-free Coordination for Internet-scale Systems , 2010, USENIX ATC.
[35] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[36] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[37] Ashwin Machanavajjhala,et al. Scalable ranked publish/subscribe , 2008, Proc. VLDB Endow..
[38] Jörg Schwenk,et al. All your clouds are belong to us: security analysis of cloud management interfaces , 2011, CCSW '11.
[39] Alexander L. Wolf,et al. Security issues and requirements for Internet-scale publish-subscribe systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.