A survey of security solutions for distributed publish/subscribe systems
AV Uzunov - Computers & Security, 2016 - Elsevier
Over the last two decades, the need for loosely-coupled, asynchronous communications and
distributed component interaction has made the publish/subscribe pattern increasingly …
distributed component interaction has made the publish/subscribe pattern increasingly …
LIVE: Lightweight integrity verification and content access control for named data networking
Named data networking (NDN) is a new paradigm for the future Internet wherein interest and
data packets carry content names rather than the current IP paradigm of source and …
data packets carry content names rather than the current IP paradigm of source and …
Capability-based security enforcement in named data networking
Named data networking (NDN) enhances traditional IP networking by supporting in-network
content caching for better bandwidth usage and location-independent data accesses for …
content caching for better bandwidth usage and location-independent data accesses for …
Security of publish/subscribe systems
M Ion - 2013 - iris.unitn.it
The increasing demand for content-centric applications has motivated researchers to rethink
and redesign the way information is stored and delivered on the Internet. Increasingly …
and redesign the way information is stored and delivered on the Internet. Increasingly …
Achieving content-oriented anonymity with CRISP
As a popular realization of Information-Centric Network (ICN), Named Data Networking
(NDN) greatly improves the efficiency of Internet content-distribution. A feature of NDN is that …
(NDN) greatly improves the efficiency of Internet content-distribution. A feature of NDN is that …
Trivial content gain control and reliability certification for NDN with GKM
SP Jagtap, PB Sahane - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
The new face of networking is growing in the named data networking (NDN). It differs from
traditional way in requesting in which request and data packet is delivered with the help of …
traditional way in requesting in which request and data packet is delivered with the help of …
[CITATION][C] Top Three News Stories on IEEE CIM in 2014 [Editor's Remarks]
H Ishibuchi - IEEE Computational Intelligence Magazine, 2015 - ieeexplore.ieee.org
Top Three News Stories on IEEE CIM in 2014 [Editor's Remarks] Page 1 Remarks Hisao
Ishibuchi Osaka Prefecture University, JAPAN Top Three News Stories on IEEE CIM in 2014 sa …
Ishibuchi Osaka Prefecture University, JAPAN Top Three News Stories on IEEE CIM in 2014 sa …