The process group approach to reliable distributed computing
Communications of the ACM
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Horus: a flexible group communication system
Communications of the ACM
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Generalized Beimal-Chor schemes for broadcast encryption and interactive key distribution
Theoretical Computer Science
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
Exploiting IP multicast in content-based publish-subscribe systems
IFIP/ACM International Conference on Distributed systems platforms
Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
The JEDI Event-Based Infrastructure and Its Application to the Development of the OPSS WFMS
IEEE Transactions on Software Engineering
Yeast: A General Purpose Event-Action System
IEEE Transactions on Software Engineering
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Multicast Protocol for Content-Based Publish-Subscribe Systems
ICDCS '99 Proceedings of the 19th IEEE International Conference on Distributed Computing Systems
Antigone: a flexible framework for secure group communication
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
IEEE Communications Magazine
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Scalable security and accounting services for content-based publish/subscribe systems
Proceedings of the 2005 ACM symposium on Applied computing
Securing publish-subscribe overlay services with EventGuard
Proceedings of the 12th ACM conference on Computer and communications security
Secure event types in content-based, multi-domain publish/subscribe systems
SEM '05 Proceedings of the 5th international workshop on Software engineering and middleware
Publish-Subscribe Grows Up: Support for Management, Visibility Control, and Heterogeneity
IEEE Internet Computing
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Proceedings of the 2007 inaugural international conference on Distributed event-based systems
QUIP: a protocol for securing content in peer-to-peer publish/subscribe overlay networks
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
On adopting Content-Based Routing in service-oriented architectures
Information and Software Technology
Secure collaborations over message boards
International Journal of Security and Networks
Access control in publish/subscribe systems
Proceedings of the second international conference on Distributed event-based systems
Secure aggregation in a publish-subscribe system
Proceedings of the 7th ACM workshop on Privacy in the electronic society
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems
Providing basic security mechanisms in broker-less publish/subscribe systems
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems
A framework for secure and private P2P publish/subscribe
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Disclosure control in multi-domain publish/subscribe systems
Proceedings of the 5th ACM international conference on Distributed event-based system
EventGuard: A System Architecture for Securing Publish-Subscribe Networks
ACM Transactions on Computer Systems (TOCS)
User-configurable semantic home automation
Computer Standards & Interfaces
Tagged sets: a secure and transparent coordination medium
COORDINATION'05 Proceedings of the 7th international conference on Coordination Models and Languages
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Living in the present: on-the-fly information processing in scalable web architectures
Proceedings of the 2nd International Workshop on Cloud Computing Platforms
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Hi-index | 0.00 |
Content-based publish-subscribe systems are an emerging paradigm for building a range of distributed applications. A specific problem in content-based systems is the secure distribution of events to clients subscribing to those events. In content-based systems, every event can potentially have a different set of interested subscribers. To provide confidentiality guarantee, we would like to encrypt messages so that only interested subscribers can read the message. In the worst case, for n clients, there can be 2n subgroups, and each event can go to a potentially different subgroup. A major problem is managing subgroup keys so that the number of encryptions required per event can be kept low. We first show the difficulties in applying existing group key management techniques to addressing the problem. We then propose and compare a number of approaches to reduce the number of encryptions and to increase message throughput. We present analytical analysis of described algorithms as well as simulation results.