A. Belokosztolszki, D. Eyers, P. Pietzuch, J. Bacon, and K. Moody, Role-based access control for publish/subscribe middleware architectures, Proceedings of the 2nd international workshop on Distributed event-based systems , DEBS '03, pp.1-8, 2003.
DOI : 10.1145/966618.966622

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.27

X. Cao and C. Shen, Subscription-aware publish/subscribe tree construction in mobile ad hoc networks, Intl. Conf. on Parallel and Distributed Systems, pp.1-9, 2009.

J. Char, Generation of trees, two-trees, and storage of master forests. Circuit Theory, IEEE Transactions on, vol.15, issue.3, pp.228-238, 1968.

L. Fiege, A. Zeidler, A. Buchmann, R. Kilian-kehr, and G. Mühl, Security aspects in publish/subscribe systems, "International Workshop on Distributed Event-based Systems (DEBS 2004)" W18L Workshop, 26th International Conference on Software Engineering, pp.44-49, 2004.
DOI : 10.1049/ic:20040381

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.4998

H. N. Gabow and E. W. Myers, Finding All Spanning Trees of Directed and Undirected Graphs, SIAM Journal on Computing, vol.7, issue.3, p.280, 1978.
DOI : 10.1137/0207024

M. Gendreau, J. Larochelle, and B. Sanso, A tabu search heuristic for the Steiner Tree Problem, Networks, vol.7, issue.4, pp.162-172, 1999.
DOI : 10.1002/(SICI)1097-0037(199909)34:2<162::AID-NET9>3.0.CO;2-9

T. Grandison and M. Sloman, A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, pp.2-16, 2000.
DOI : 10.1109/COMST.2000.5340804

Y. Huang and H. Garcia-molina, Publish/subscribe tree construction in wireless adhoc networks, pp.122-140, 2003.
DOI : 10.1007/3-540-36389-0_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.5529

R. Jayakumar, K. Thulasiraman, and M. Swamy, Complexity of computation of a spanning tree enumeration algorithm. Circuits and Systems, IEEE Transactions on, issue.10, pp.31-853, 1984.

S. Kamvar, M. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

S. Kulturel-konak, B. Norman, D. W. Coit, and A. E. Smith, Exploiting Tabu Search Memory in Constrained Problems, INFORMS Journal on Computing, vol.16, issue.3, pp.241-254, 2004.
DOI : 10.1287/ijoc.1030.0040

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.1590

S. Marti, P. Ganesan, and H. Garcia-molina, SPROUT: P2P Routing with Social Networks, Current Trends in Database Technology-EDBT 2004 Workshops, pp.511-512, 2005.
DOI : 10.1007/978-3-540-30192-9_42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.9781

Z. Miklós, Towards an access control mechanism for wide-area publish/subscribe systems, Proceedings 22nd International Conference on Distributed Computing Systems Workshops, pp.516-521, 2002.
DOI : 10.1109/ICDCSW.2002.1030820

G. Minty, A Simple Algorithm for Listing All the Trees of a Graph. Circuit Theory, IEEE Transactions on, vol.12, issue.1, pp.120-120, 1965.

G. Mühl, Large-Scale Content-Based Publish/Subscribe Systems, 2002.

P. Pietzuch and J. Bacon, Hermes: a distributed event-based middleware architecture, Proceedings 22nd International Conference on Distributed Computing Systems Workshops, pp.611-618, 2002.
DOI : 10.1109/ICDCSW.2002.1030837

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.9899

C. Raiciu and D. S. Rosenblum, Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures, 2006 Securecomm and Workshops, pp.1-11, 2006.
DOI : 10.1109/SECCOMW.2006.359552

URL : http://discovery.ucl.ac.uk/4993/1/4993.pdf

J. Rawls, A theory of justice, 1971.

I. Ray and S. Chakraborty, A Vector Model of Trust for Developing Trustworthy Systems, Computer Security ESORICS, pp.260-275, 2004.
DOI : 10.1007/978-3-540-30108-0_16

C. C. Ribeiro, D. Souza, and M. C. , Tabu search for the steiner tree problem in graphs, pp.138-146, 2000.

A. Sen, Interpersonal Aggregation and Partial Comparability, Econometrica, vol.38, issue.3, pp.393-409, 1970.
DOI : 10.2307/1909546

H. Takahashi and A. Matsuyama, An approximate solution for the Steiner problem in graphs, Math. Japonica, vol.24, issue.6, pp.573-577, 1980.

G. Theodorakopoulos and J. Baras, On trust models and trust evaluation metrics for ad hoc networks. Selected Areas in Communications, IEEE Journal on, vol.24, issue.2, pp.318-328, 2006.

C. Wang, A. Carzaniga, D. Evans, and A. Wolf, Security issues and requirements for Internet-scale publish-subscribe systems, Proc. of the 35th Annual Hawaii Intl. Conf. on System Sciences (HICSS), pp.3940-3947, 2002.

A. Wun and H. A. Jacobsen, A Policy Management Framework for Content-Based Publish/Subscribe Middleware, Middleware 2007, pp.368-388, 2007.
DOI : 10.1145/937503.937506

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6252