메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1211-1219

A practical and flexible key management mechanism for trusted collaborative computing

Author keywords

Access control; Cryptography; Information security; Key management; Secure group communication; Trusted Collaborative Computing (TCC)

Indexed keywords

COMMUNICATION; COMPUTER NETWORKS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; MANAGEMENT; MECHANISMS; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY SYSTEMS;

EID: 51349114288     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.102     Document Type: Conference Paper
Times cited : (54)

References (36)
  • 4
    • 32944479938 scopus 로고    scopus 로고
    • Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast
    • G. Badishi, I. Keidar, and A. Sasson, "Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 45-61, 2006.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.1 , pp. 45-61
    • Badishi, G.1    Keidar, I.2    Sasson, A.3
  • 7
    • 3543050471 scopus 로고    scopus 로고
    • Efficient self-healing group key distribution with revocation capability
    • D. Liu, P. Ning, and K. Sun, "Efficient self-healing group key distribution with revocation capability," ACM CCS, pp. 231-240, 2003.
    • (2003) ACM CCS , pp. 231-240
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 8
    • 34147147912 scopus 로고    scopus 로고
    • Dynamic Balanced Key Tree Management for Secure Multicast Communications
    • W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, "Dynamic Balanced Key Tree Management for Secure Multicast Communications," IEEE Transactions on Computers, 56(5), pp. 577-589, 2007.
    • (2007) IEEE Transactions on Computers , vol.56 , Issue.5 , pp. 577-589
    • Ng, W.H.D.1    Howarth, M.2    Sun, Z.3    Cruickshank, H.4
  • 12
    • 0030609312 scopus 로고    scopus 로고
    • S. Mittra, Iolus: A framework for scalable secure multicasting, J. of Computer Communication Reviews, 27(4):277-288, 1997.
    • S. Mittra, "Iolus: A framework for scalable secure multicasting," J. of Computer Communication Reviews, 27(4):277-288, 1997.
  • 17
    • 15244360279 scopus 로고    scopus 로고
    • An Efficient Key Pre-Distribution Scheme for Ad-Hoc Network Security
    • M. Ramkumar, and N. Memon, "An Efficient Key Pre-Distribution Scheme for Ad-Hoc Network Security," IEEE Journal on Selected Areas in Communication., 23(3):611-621, 2005.
    • (2005) IEEE Journal on Selected Areas in Communication , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 24
    • 0001720832 scopus 로고    scopus 로고
    • Generalied beimelchor scheme for broadcast encryption and interactive key distribution
    • C. Blundo, L. A. F. Mattos, and D. R. Stinson, "Generalied beimelchor scheme for broadcast encryption and interactive key distribution," Theoretical Computer Science, vol. 200, pp. 313-334, 1998.
    • (1998) Theoretical Computer Science , vol.200 , pp. 313-334
    • Blundo, C.1    Mattos, L.A.F.2    Stinson, D.R.3
  • 25
    • 0034238689 scopus 로고    scopus 로고
    • Key management for restricted multicast using broadcast encryption
    • M. Abdalla, Y. Shavitt, and A. Wool., "Key management for restricted multicast using broadcast encryption," IEEE/ACM Transactions on Networking, 8(4):443-454, 2000.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.4 , pp. 443-454
    • Abdalla, M.1    Shavitt, Y.2    Wool, A.3
  • 28
    • 84976752387 scopus 로고
    • A cryptographic solution to the problem of access control in a hierarchy
    • S. G. AkI, and P. D. Taylor, "A cryptographic solution to the problem of access control in a hierarchy," ACM Transactions on Computer Systems, pp. 239-248, 1983.
    • (1983) ACM Transactions on Computer Systems , pp. 239-248
    • AkI, S.G.1    Taylor, P.D.2
  • 29
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S. T. Mackinnon, P. D. Taylor, H. Meijer, and S. G. Akl, "An optimal algorithm for assigning cryptographic keys to control access in a hierarchy," IEEE Transactions on Computers, vol. 34, no. 9, pp. 797-802, 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • Mackinnon, S.T.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 31
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Advances in Cryptology: CRYPTO'89
    • G. C. Chick, and S. E. Tavares, "Flexible access control with master keys," Advances in Cryptology: CRYPTO'89 LNCS, vol. 435, pp. 316-322, 1990.
    • (1990) LNCS , vol.435 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 33
  • 35
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 36
    • 18744416849 scopus 로고    scopus 로고
    • On permissions, inheritance and role hierarchies
    • J. Crampton, "On permissions, inheritance and role hierarchies," ACM CCS'03, pp. 85-92, 2003.
    • (2003) ACM CCS'03 , pp. 85-92
    • Crampton, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.