메뉴 건너뛰기




Volumn 15, Issue 6, 2007, Pages 1514-1526

Hierarchical group access control for secure multicast communications

Author keywords

Access protocols; Communication system privacy; Hierarchical systems; Multicast communication; System design

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; HIERARCHICAL SYSTEMS; MARKOV PROCESSES; SCALABILITY; STATISTICAL METHODS; SYSTEMS ANALYSIS;

EID: 37549056155     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2007.897955     Document Type: Article
Times cited : (57)

References (33)
  • 3
    • 0033356116 scopus 로고    scopus 로고
    • A survey of security issues in multicast communications
    • Nov
    • M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol. 13, no. 6, pp. 12-23, Nov. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 4
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 5
    • 0003978251 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • draft-wallner-key-arch-01.txt, Sep
    • D. M. Wallner, E. J. Harder, and R. C. Agee, "Key management for multicast: Issues and architectures," Internet Draft Rep., draft-wallner-key-arch-01.txt, Sep. 1998.
    • (1998) Internet Draft Rep
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3
  • 7
    • 0034849209 scopus 로고    scopus 로고
    • Key distribution for secure multimedia multicasts via data embedding
    • May
    • W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE ICASSP'01, May 2001, pp. 1449-1452.
    • (2001) Proc. IEEE ICASSP'01 , pp. 1449-1452
    • Trappe, W.1    Song, J.2    Poovendran, R.3    Liu, K.J.R.4
  • 10
    • 0034838199 scopus 로고    scopus 로고
    • ELK, a new protocol for efficient large-group key distribution
    • A. Perrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in Proc. IEEE Symp. Security Privacy 2001, pp. 247-262.
    • (2001) Proc. IEEE Symp. Security Privacy , pp. 247-262
    • Perrig, A.1    Song, D.2    Tygar, D.3
  • 11
    • 0024715386 scopus 로고
    • Secure broadcasting using the secure lock
    • Aug
    • G. H. Chiou and W. T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Softw. Eng., vol. 15, no. 8, pp. 929-934, Aug. 1989.
    • (1989) IEEE Trans. Softw. Eng , vol.15 , Issue.8 , pp. 929-934
    • Chiou, G.H.1    Chen, W.T.2
  • 12
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proc. ACM SIGCOMM, 1997, pp. 277-288.
    • (1997) Proc. ACM SIGCOMM , pp. 277-288
    • Mittra, S.1
  • 13
    • 0036800721 scopus 로고    scopus 로고
    • Scalable secure group communication over IP multicast
    • Oct
    • S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over IP multicast," IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1511-1527, Oct. 2002.
    • (2002) IEEE J. Sel. Areas Commun , vol.20 , Issue.8 , pp. 1511-1527
    • Banerjee, S.1    Bhattacharjee, B.2
  • 14
    • 0020180459 scopus 로고
    • A conference key distribution system
    • Sep
    • I. Ingemarson, D. T. Tang, and C. K. Wong, "A conference key distribution system," IEEE Trans. Inf. Theory, vol. IT-28, no. 5, pp. 714-720, Sep. 1982.
    • (1982) IEEE Trans. Inf. Theory , vol.IT-28 , Issue.5 , pp. 714-720
    • Ingemarson, I.1    Tang, D.T.2    Wong, C.K.3
  • 16
    • 0000288916 scopus 로고
    • A secure and efficient conference key distribution scheme
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution scheme," Adv. Cryptology- Eurocrypt, pp. 275-286, 1994.
    • (1994) Adv. Cryptology- Eurocrypt , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 22
    • 15544371460 scopus 로고    scopus 로고
    • Resource-aware conference key establishment for heterogeneous networks
    • Feb
    • W. Trappe, Y. Wang, and K. J. R. Liu, "Resource-aware conference key establishment for heterogeneous networks," IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 134-146, Feb. 2005.
    • (2005) IEEE/ACM Trans. Netw , vol.13 , Issue.1 , pp. 134-146
    • Trappe, W.1    Wang, Y.2    Liu, K.J.R.3
  • 25
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 26
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communications
    • Mar
    • Y. Sun and K. J. R. Liu, "Scalable hierarchical access control in secure group communications," in Proc. IEEE INFOCOM, Mar. 2004.
    • (2004) Proc. IEEE INFOCOM
    • Sun, Y.1    Liu, K.J.R.2
  • 27
    • 0029749268 scopus 로고    scopus 로고
    • Collecting and modeling the join/leave behavior of multicast group members in the mbone
    • Syracuse, NY
    • K. Almeroth and M. Ammar, "Collecting and modeling the join/leave behavior of multicast group members in the mbone," in Proc. 5th IEEE Int. Symp. High Performance Distributed Comput., Syracuse, NY, 1996, pp. 209-216.
    • (1996) Proc. 5th IEEE Int. Symp. High Performance Distributed Comput , pp. 209-216
    • Almeroth, K.1    Ammar, M.2
  • 28
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the Internet's multicast backbone (MBone)
    • Jun
    • K. Almeroth and M. Ammar, "Multicast group behavior in the Internet's multicast backbone (MBone)," IEEE Commun., vol. 35, pp. 224-229, Jun. 1999.
    • (1999) IEEE Commun , vol.35 , pp. 224-229
    • Almeroth, K.1    Ammar, M.2
  • 31
    • 0036286367 scopus 로고    scopus 로고
    • A time-efficient contributory key agreement scheme for secure group communications
    • B. Sun, W. Trappe, Y. Sun, and K. J. R. Liu, "A time-efficient contributory key agreement scheme for secure group communications," in Proc. IEEE Int. Conf. Commun. (ICC), 2002, vol. 2, pp. 1159-1163.
    • (2002) Proc. IEEE Int. Conf. Commun. (ICC) , vol.2 , pp. 1159-1163
    • Sun, B.1    Trappe, W.2    Sun, Y.3    Liu, K.J.R.4
  • 32
    • 33750355393 scopus 로고    scopus 로고
    • JET: Dynamic joint-exist-tree amortization and scheduling for contributory key agreement
    • Oct
    • Y. Mao, Y. Sun, M. Wu, and K. J. R. Liu, "JET: Dynamic joint-exist-tree amortization and scheduling for contributory key agreement," IEEE/ACM Trans. Netw., vol. 14, no. 5, pp. 1128-1140, Oct. 2006.
    • (2006) IEEE/ACM Trans. Netw , vol.14 , Issue.5 , pp. 1128-1140
    • Mao, Y.1    Sun, Y.2    Wu, M.3    Liu, K.J.R.4
  • 33
    • 4644294648 scopus 로고    scopus 로고
    • A scalable multicast key management scheme for heterogeneous wireless networks
    • Aug
    • Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 653-666, Aug. 2004.
    • (2004) IEEE/ACM Trans. Netw , vol.12 , Issue.4 , pp. 653-666
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.