메뉴 건너뛰기




Volumn 7, Issue 2, 2005, Pages 46-70

Multicast receiver and sender access control and its applicability to mobile IP environments: A survey

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; CONTROL PROBLEMS; DELIVERY TREE; DOS ATTACKS; HOST MOBILITY; HYBRID SOLUTION; MOBILE IP;

EID: 33749055858     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2005.1610545     Document Type: Review
Times cited : (20)

References (59)
  • 3
    • 84961917665 scopus 로고    scopus 로고
    • Key Establishment for IGMP Authentication in IP Multicast
    • T. Hardjono and B. Cain "Key Establishment for IGMP Authentication in IP Multicast," ECUMN, France, Oct. 2000, pp. 247-52.
    • ECUMN, France, Oct. 2000 , pp. 247-252
    • Hardjono, T.1    Cain, B.2
  • 14
    • 26444509370 scopus 로고    scopus 로고
    • IP Mobile Multicast: Challenges and Solutions
    • 1st Quarter
    • I. Romdhani et al., "IP Mobile Multicast: Challenges and Solutions," IEEE Commun. Surveys and Tutorials, vol. 6, no. 1, 1st Quarter 2004.
    • (2004) IEEE Commun. Surveys and Tutorials , vol.6 , Issue.1
    • Romdhani, I.1
  • 15
    • 0028513932 scopus 로고
    • Access Control: Principle and Practice
    • R. S. Sandhu and P. Samarati, "Access Control: Principle and Practice," IEEE Commun. Mag., vol. 32, no. 9, 1994, pp. 40-48.
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 17
    • 0031272629 scopus 로고    scopus 로고
    • Security Management Architecture for Access Control to Network Resources
    • Nov.
    • G. P. Kumar and P. Venkateram, "Security Management Architecture for Access Control to Network Resources," IEEE Proc. Comp. and Digital Techniques, vol. 144-6, Nov. 1997, pp. 362-70.
    • (1997) IEEE Proc. Comp. and Digital Techniques , vol.144 , Issue.6 , pp. 362-370
    • Kumar, G.P.1    Venkateram, P.2
  • 19
    • 0036349003 scopus 로고    scopus 로고
    • Gothic: A Group Access Control Architecture for Secure Multicast and Anycast
    • P. Judge and M. Ammar, "Gothic: A Group Access Control Architecture for Secure Multicast and Anycast," IEEE INFOCOM, New York, June 2002, pp. 1547-56.
    • IEEE INFOCOM, New York, June 2002 , pp. 1547-1556
    • Judge, P.1    Ammar, M.2
  • 24
    • 0018051340 scopus 로고
    • Reverse Path Forwarding of Broadcast Packets
    • Dec.
    • Y. K. Dalal and R. M. Metcalfe. "Reverse Path Forwarding of Broadcast Packets," Commun. ACM, vol. 21, no. 12, Dec. 1978, pp. 1040-48.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 1040-1048
    • Dalal, Y.K.1    Metcalfe, R.M.2
  • 25
    • 23044531051 scopus 로고    scopus 로고
    • Scalable IP Multicast Sender Access Control for Bi-directional Trees
    • J. Crowcroft, M. Hofmann, Eds., Springer, Nov.
    • N. Wang and G. Pavlou, "Scalable IP Multicast Sender Access Control for Bi-directional Trees," Proc. 3rd Int'l. Wksp. Networked Group Commun. (NGC'2001), London, J. Crowcroft, M. Hofmann, Eds., Springer, Nov. 2001, pp. 141-158.
    • (2001) Proc. 3rd Int'l. Wksp. Networked Group Commun. (NGC'2001), London , pp. 141-158
    • Wang, N.1    Pavlou, G.2
  • 30
    • 0036805551 scopus 로고    scopus 로고
    • Public Key Infrastructure in Mobile Systems
    • Oct.
    • J. Dankers et al., "Public Key Infrastructure in Mobile Systems," Electronics & Commun. Eng. J., vol. 14, Oct. 2002, pp. 180-90.
    • (2002) Electronics & Commun. Eng. J. , vol.14 , pp. 180-190
    • Dankers, J.1
  • 31
    • 0013045273 scopus 로고    scopus 로고
    • Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
    • G. Montenegro and C. Castelluccia, "Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses," ISOC NDSS'02, 2002.
    • ISOC NDSS'02, 2002
    • Montenegro, G.1    Castelluccia, C.2
  • 32
    • 33645492588 scopus 로고
    • National Institute of Standards and Technology (NIST), Digital Signature Standard (DSS), U.S. Department of Commerce, 19 May
    • National Institute of Standards and Technology (NIST), Federal Information Processing Standard (FIPS) PUB 186, Digital Signature Standard (DSS), U.S. Department of Commerce, 19 May 1994.
    • (1994) Federal Information Processing Standard (FIPS) PUB 186
  • 33
    • 0003028765 scopus 로고
    • National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS), U.S. Department of Commerce, Washington
    • National Institute of Standards and Technology (NIST), Federal Information Processing Standard (FIPS) PUB 180-1, Secure Hash Standard (SHS), U.S. Department of Commerce, Washington, 1995.
    • (1995) Federal Information Processing Standard (FIPS) PUB 180-1
  • 37
    • 3042593306 scopus 로고    scopus 로고
    • Public Key Infrastructures that Satisfy Security Goals
    • July-Aug.
    • W. T. Polk, N. E. Hastings, and A. Malpani, "Public Key Infrastructures that Satisfy Security Goals," IEEE Internet Computing, vol. 7, July-Aug. 2003, pp. 60-67.
    • (2003) IEEE Internet Computing , vol.7 , pp. 60-67
    • Polk, W.T.1    Hastings, N.E.2    Malpani, A.3
  • 40
    • 35248872561 scopus 로고    scopus 로고
    • Cryptographically Generated Addresses (CGA)
    • T. Aura "Cryptographically Generated Addresses (CGA)," ISC'03, Oct. 2003, pp. 29-43.
    • ISC'03, Oct. 2003 , pp. 29-43
    • Aura, T.1
  • 48
    • 84855395742 scopus 로고    scopus 로고
    • Internet Draft, draft-iab-auth-mech-03.txt, Mar. work in progress
    • E. Rescorla, "A Survey of Authentication Mechanisms," Internet Draft, draft-iab-auth-mech-03.txt, Mar. 2004 (work in progress).
    • (2004) A Survey of Authentication Mechanisms
    • Rescorla, E.1
  • 56
    • 0345565893 scopus 로고    scopus 로고
    • A Survey of Key Management for Secure Group Communication
    • Sept.
    • S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys (CSUR), vol. 35, Sept. 2003, pp. 309-29.
    • (2003) ACM Computing Surveys (CSUR) , vol.35 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 57
    • 0037250819 scopus 로고    scopus 로고
    • Security Issues and Solutions in Multicast Content Distribution: A Survey
    • P. Judge and M. Ammar, "Security Issues and Solutions in Multicast Content Distribution: A Survey," IEEE Network, 2003, pp. 30-36.
    • (2003) IEEE Network , pp. 30-36
    • Judge, P.1    Ammar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.