Causally ordering delivery of event messages in P2PPSO systems
暂无分享,去创建一个
Tomoya Enokido | Shigenari Nakamura | Makoto Takizawa | M. Takizawa | Shigenari Nakamura | T. Enokido
[1] Akihito Nakamura,et al. Causally ordering broadcast protocol , 1994, 14th International Conference on Distributed Computing Systems.
[2] Lidia Ogiela,et al. Intelligent techniques for secure financial management in cloud computing , 2015, Electron. Commer. Res. Appl..
[3] Tomoya Enokido,et al. A flexible read-write abortion protocol with role safety concept to prevent illegal information flow , 2018, J. Ambient Intell. Humaniz. Comput..
[4] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[5] Tomoya Enokido,et al. A topic-based synchronisation protocol in peer-to-peer publish/subscribe systems , 2020, Int. J. Commun. Networks Distributed Syst..
[6] Paulo S. C. Alencar,et al. Event Models in Distributed Event Based Systems , 2010, Principles and Applications of Distributed Event-Based Systems.
[7] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[8] Urszula Ogiela,et al. Visual CAPTCHA application in linguistic cryptography , 2018, Concurr. Comput. Pract. Exp..
[9] Tomoya Enokido,et al. Purpose-Based Information Flow Control for Cyber Engineering , 2011, IEEE Transactions on Industrial Electronics.
[10] Fatos Xhafa,et al. JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing , 2011, IEEE Transactions on Industrial Electronics.
[11] Urszula Ogiela,et al. Linguistic techniques for cryptographic data sharing algorithms , 2018, Concurr. Comput. Pract. Exp..
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[13] Maarten van Steen,et al. PolderCast: Fast, Robust, and Scalable Architecture for P2P Topic-Based Pub/Sub , 2012, Middleware.
[14] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[15] Dilawaer Duolikun,et al. Read-abortion (RA) based synchronization protocols to prevent illegal information flow , 2015, Journal of computer and system sciences (Print).
[16] Marek R. Ogiela,et al. Bio-Inspired Cryptographic Techniques in Information Management Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[17] Dilawaer Duolikun,et al. A read-write abortion protocol to prevent illegal information flow in role-based access control systems , 2016, Int. J. Space Based Situated Comput..
[18] Naohiro Hayashibara,et al. Merging Topic Groups of a Publish/Subscribe System in Causal Order , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[19] David M. Eyers,et al. Access control in publish/subscribe systems , 2008, DEBS.
[20] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[21] Marek R. Ogiela,et al. On Using Cognitive Models in Cryptography , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[22] Tomoya Enokido,et al. Information flow control in object‐based peer‐to‐peer publish/subscribe systems , 2020, Concurr. Comput. Pract. Exp..
[23] Tomoya Enokido,et al. A Flexible Synchronization Protocol to Learn Hidden Topics in P2PPS Systems , 2019, Trans. Comput. Collect. Intell..
[24] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[25] Eduardo B. Fernandez,et al. Database Security and Integrity , 1981 .
[26] J. Wenny Rahayu,et al. Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments , 2012, J. Comput. Syst. Sci..
[27] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[28] Tomoya Enokido,et al. Scalable Group Communication Protocols in the Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems , 2016, 2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS).
[29] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[30] Tomoya Enokido,et al. An information flow control model in a topic-based publish/subscribe system , 2018, J. High Speed Networks.