메뉴 건너뛰기




Volumn 1, Issue 1-2, 2006, Pages 113-124

Secure collaborations over message boards

Author keywords

key predistribution; message board; secure collaboration; trust modules

Indexed keywords


EID: 40949119439     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.010828     Document Type: Article
Times cited : (10)

References (47)
  • 10
    • 0025212474 scopus 로고
    • A matrix key distribution scheme
    • Gong, L. and Wheeler, D.J. (1990) ‘A matrix key distribution scheme’, Journal of Cryptology, Vol. 2, No. 2, pp.51–59.
    • (1990) Journal of Cryptology , vol.2 , Issue.2 , pp. 51-59
    • Gong, L.1    Wheeler, D.J.2
  • 13
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: a modular approach
    • Hughes, D. and Shmatilov, V. (2004) ‘Information hiding, anonymity and privacy: a modular approach’, Journal of Computer Security.
    • (2004) Journal of Computer Security
    • Hughes, D.1    Shmatilov, V.2
  • 14
    • 33644536683 scopus 로고    scopus 로고
    • Scalable security and accounting services for content-based publish/subscribe systems
    • March
    • Khurana, H. (2005) ‘Scalable security and accounting services for content-based publish/subscribe systems’, ACM Symposium on Applied Computing (SAC), March.
    • (2005) ACM Symposium on Applied Computing (SAC)
    • Khurana, H.1
  • 15
    • 3042592877 scopus 로고    scopus 로고
    • Ubiquitous access for collaborative information system using SVG
    • July, Zurich, Switzerland
    • Lee, S., Fox, G., Ko, S., Wang, M. and Qiu, X. (2002) ‘Ubiquitous access for collaborative information system using SVG, Proceedings of SVGopen Conference, July, Zurich, Switzerland.
    • (2002) Proceedings of SVGopen Conference
    • Lee, S.1    Fox, G.2    Ko, S.3    Wang, M.4    Qiu, X.5
  • 16
    • 84949023663 scopus 로고
    • Secret-key agreement without public-Key cryptography
    • Leighton, T. and Micali, S. (1994) ‘Secret-key agreement without public-Key cryptography’, Advances in Cryptology, pp.456–479.
    • (1994) Advances in Cryptology , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 17
    • 0017914899 scopus 로고
    • Generation, distribution and installation of cryptographic keys
    • Matyas, S.M. and Meyer, C.H. (1978) ‘Generation, distribution and installation of cryptographic keys’, IBM Systems Journal, Vol. 2, pp.126–137.
    • (1978) IBM Systems Journal , vol.2 , pp. 126-137
    • Matyas, S.M.1    Meyer, C.H.2
  • 19
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Chantilly, VA
    • Moody, Y.W. and Bacon, J. (2002) ‘A model of OASIS role-based access control and its support for active security’, ACM Symposium on Access Control Model and Technology, Chantilly, VA.
    • (2002) ACM Symposium on Access Control Model and Technology
    • Moody, Y.W.1    Bacon, J.2
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • Needham, R. and Schroeder, M. (1978) ‘Using encryption for authentication in large networks of computers’, Communications of the ACM, Vol. 21, No. 12, December.
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 24
    • 85084164565 scopus 로고    scopus 로고
    • Secure distribution of events in content-based publish subscribe systems
    • August, Washington, DC
    • Opyrchal, L. and Prakash, A. (2001) ‘Secure distribution of events in content-based publish subscribe systems’, USENIX Security 01, August, Washington, DC.
    • (2001) USENIX Security 01
    • Opyrchal, L.1    Prakash, A.2
  • 25
    • 0842289248 scopus 로고    scopus 로고
    • Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
    • San Fransisco, CA, December
    • Ramkumar, M., Memon, N. and Simha, R. (2003) ‘Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks’, Globecom, San Fransisco, CA, December.
    • (2003) Globecom
    • Ramkumar, M.1    Memon, N.2    Simha, R.3
  • 26
    • 33646829629 scopus 로고    scopus 로고
    • On broadcast encryption with random key pre-distribution schemes
    • Kolkata, India, December
    • Ramkumar, M. (2005) ‘On broadcast encryption with random key pre-distribution schemes’, LNCS, ICISS 2005, Kolkata, India, December, Vol. 3803, pp.304–316.
    • (2005) LNCS, ICISS 2005 , vol.3803 , pp. 304-316
    • Ramkumar, M.1
  • 27
    • 8344240024 scopus 로고    scopus 로고
    • Building a high-performance programmable secure coprocessor
    • February
    • Smith, S.W. and Weingart, S. (1998) ‘Building a high-performance programmable secure coprocessor’, IBM Technical Report RC21102, February.
    • (1998) IBM Technical Report RC21102
    • Smith, S.W.1    Weingart, S.2
  • 28
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • March
    • Tolone, W., Ahn, G-J. and Pai, T. (2005) ‘Access control in collaborative systems’, ACM Computing Surveys, Vol. 37, No. 1, March.
    • (2005) ACM Computing Surveys , vol.37 , Issue.1
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3
  • 30
    • 84952968151 scopus 로고    scopus 로고
    • http://www.w3.org/TR/SVG/.
  • 31
    • 84952956631 scopus 로고    scopus 로고
    • For example, a ‘Google Message Board’ or a ‘Yahoo Message Board’
    • For example, a ‘Google Message Board’ or a ‘Yahoo Message Board’.
  • 32
    • 84952953506 scopus 로고    scopus 로고
    • Though catering for unregulated read-access is not a practical necessity, from a security stand-point, the assumption that ‘reading from the MB is open to all’ caters for posting of messages over insecure channels
    • Though catering for unregulated read-access is not a practical necessity, from a security stand-point, the assumption that ‘reading from the MB is open to all’ caters for posting of messages over insecure channels.
  • 33
    • 84952971732 scopus 로고    scopus 로고
    • If A posts a message for B no one else apart from A and B should even know that A attempted to communicate with B.
    • If A posts a message for B no one else apart from A and B should even know that A attempted to communicate with B.
  • 34
    • 84952960647 scopus 로고    scopus 로고
    • See
    • See https://www.trustedcomputinggroup.org/.
  • 35
    • 84952970552 scopus 로고    scopus 로고
    • Asymmetric RPS however does not employ any public key primitives
    • Asymmetric RPS however does not employ any public key primitives.
  • 36
    • 84952968763 scopus 로고    scopus 로고
    • As we shall see in a later section, a ‘higher authority’ instructs the LM-KDS to issue secrets corresponding to a ID A1 = h(A) to the node with ID A.
    • As we shall see in a later section, a ‘higher authority’ instructs the LM-KDS to issue secrets corresponding to a ID A1 = h(A) to the node with ID A.
  • 37
    • 84952973013 scopus 로고    scopus 로고
    • The limit is the number of bits used to represent the ID of any node - as each node requires a unique ID.
    • The limit is the number of bits used to represent the ID of any node - as each node requires a unique ID.
  • 38
    • 84952953189 scopus 로고    scopus 로고
    • This approach, of using host master keys to encrypt all other keys dates back to Matyas and Meyer (1978)
    • This approach, of using host master keys to encrypt all other keys dates back to Matyas and Meyer (1978).
  • 39
    • 84952969911 scopus 로고    scopus 로고
    • We shall denote by K (M) the encryption of a value M using a key K, in conjunction with some block cipher
    • We shall denote by K (M) the encryption of a value M using a key K, in conjunction with some block cipher.
  • 40
    • 84952966145 scopus 로고    scopus 로고
    • In some application scenarios even session secrets may need to be protected from the end user. This issue is briefly discussed in Section 6
    • In some application scenarios even session secrets may need to be protected from the end user. This issue is briefly discussed in Section 6.
  • 41
    • 84952953049 scopus 로고    scopus 로고
    • We shall henceforth use A to represent Alice’s public ID, and her TM. The context will make the distinction clear. We shall also represent by ‘Alice’ the person or her PDA
    • We shall henceforth use A to represent Alice’s public ID, and her TM. The context will make the distinction clear. We shall also represent by ‘Alice’ the person or her PDA.
  • 42
    • 84952954386 scopus 로고    scopus 로고
    • For instance, if Alice knows signatures for two nonce’s N1 and N2 she could easily fabricate the signature of Tu for N1N2. While there are simple techniques to overcome this problem, it is perhaps safer to ensure that both parties do not have freedom in choosing the nonce
    • For instance, if Alice knows signatures for two nonce’s N1 and N2 she could easily fabricate the signature of Tu for N1N2. While there are simple techniques to overcome this problem, it is perhaps safer to ensure that both parties do not have freedom in choosing the nonce.
  • 43
    • 84952961602 scopus 로고    scopus 로고
    • Alice will receive the secrets MA1 and MA^ independently - at different times
    • Alice will receive the secrets MA1 and MA^ independently - at different times.
  • 44
    • 84952972866 scopus 로고    scopus 로고
    • Similarly S5 is not strictly a prerequisite for step S6
    • Similarly S5 is not strictly a prerequisite for step S6.
  • 45
    • 84952956094 scopus 로고    scopus 로고
    • In practice there may be multiple sets of secrets corresponding to multiple gateways
    • In practice there may be multiple sets of secrets corresponding to multiple gateways.
  • 46
    • 84952966140 scopus 로고    scopus 로고
    • After allA-RPS is exactly identical to the broadcast authentication scheme by Canetti et al. (1999) - only that in the SCMB it is primarily used for different purposes
    • After allA-RPS is exactly identical to the broadcast authentication scheme by Canetti et al. (1999) - only that in the SCMB it is primarily used for different purposes.
  • 47
    • 84952960791 scopus 로고    scopus 로고
    • However, for broadcast messages the same strategies may not be appropriate. They may contain more fields to indicate the classification, key words etc., apart from the source of the broadcast
    • However, for broadcast messages the same strategies may not be appropriate. They may contain more fields to indicate the classification, key words etc., apart from the source of the broadcast.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.