메뉴 건너뛰기




Volumn , Issue , 2010, Pages 485-489

Group key management based on information flow policy for multi-privileged groups

Author keywords

Information flow policy; Key multi tree graph; Multi privileged group communications; Rekeying algorithm

Indexed keywords

GROUP COMMUNICATIONS; GROUP KEY MANAGEMENT; HIGH EFFICIENCY; INFORMATION FLOW POLICIES; INFORMATION FLOWS; MULTI-PRIVILEGED GROUP COMMUNICATIONS; NETWORK SERVICES; RE-KEYING; REKEYING ALGORITHM; SECURITY GROUP COMMUNICATION; SIMULATION MODEL; SIMULATION RESULT; STORAGE OVERHEAD; TREE GRAPH; VIRTUAL USERS;

EID: 79951632028     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICITIS.2010.5689555     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 1
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb.
    • C.Wong, M.Gouda, and S.Lam, "Secure group communications using key graphs, " IEEE/ACM Trans. Networking, vol.8, no.1, Feb.2000.
    • (2000) IEEE/ACM Trans. Networking , vol.8 , Issue.1
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. Akl and P. Taylor. "Cryptographic solution to a problem of access control in a hierarchy, " ACM Trans. Computer Systems, 1(3):239-248, 1983.
    • (1983) ACM Trans. Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • PII S014036649700100X
    • C.-H. Lin. "Dynamic key management schemes for access control in a hierarchy, " Computer Communications, 20:1381-1385, 1997. (Pubitemid 127403281)
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.-H.1
  • 4
    • 10444280844 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a user hierarchy
    • T.-S. Chen and J.-Y. Huang. "A novel key management scheme for dynamic access control in a user hierarchy, " Applied Mathematics and Computation, 162:339-351, 2005.
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 339-351
    • Chen, T.-S.1    Huang, J.-Y.2
  • 5
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communications
    • Y.Sun and K.J.R.Liu, "Scalable hierarchical access control in secure group communications, " in Proc. IEEE INFOCOM'04, pp. 1296-1306, 2004.
    • (2004) Proc. IEEE INFOCOM'04 , pp. 1296-1306
    • Sun, Y.1    Liu, K.J.R.2
  • 6
    • 37549056155 scopus 로고    scopus 로고
    • Hierarchical group access control for secure multicast communications
    • Y.Sun and K.J.R.Liu, "Hierarchical group access control for secure multicast communications, " IEEE/ACM Trans. Networking, vo.15, pp. 1514-1526, 2007.
    • (2007) IEEE/ACM Trans. Networking , vol.15 , pp. 1514-1526
    • Sun, Y.1    Liu, K.J.R.2
  • 8
    • 18144373773 scopus 로고    scopus 로고
    • A centralized key management scheme for hierarchical access control
    • SN02-2, GLOBECOM'04 - IEEE Global Telecommunications Conference
    • Q. Zhang and Y. Wang. "A centralized key management scheme for hierarchical access control, " Global Telecommunications Conference 4, pp. 2067-2071, 2004. (Pubitemid 40610972)
    • (2004) GLOBECOM - IEEE Global Telecommunications Conference , vol.4 , pp. 2067-2071
    • Zhang, Q.1    Wang, Y.2
  • 9
    • 34548075870 scopus 로고    scopus 로고
    • Efficient group key management for multi-privileged groups
    • G.-J. Wang, J. Ouyang and H.-H. Chen. "Efficient group key management for multi-privileged groups, " Computer Communications, vol. 30, pp. 2497-2509, 2004.
    • (2004) Computer Communications , vol.30 , pp. 2497-2509
    • Wang, G.-J.1    Ouyang, J.2    Chen, H.-H.3
  • 10
    • 70450235087 scopus 로고    scopus 로고
    • A tree key graph design scheme for hierarchical multi-group access control
    • H.-S. Koo, O.-H. Kwon, S.-W. Ra. "A tree key graph design scheme for hierarchical multi-group access control, "IEEE Trans, 2009.
    • (2009) IEEE Trans
    • Koo, H.-S.1    Kwon, O.-H.2    Ra, S.-W.3
  • 11
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R.S. Sandhu. "Lattice-based access control models, " IEEE Trans. Computer, vol.26, pp. 9-19, 1993.
    • (1993) IEEE Trans. Computer , vol.26 , pp. 9-19
    • Sandhu, R.S.1
  • 12
  • 14
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the internets multicast backbone (MBone)
    • K.Almeroth and M.Ammar. "Multicast group behavior in the internets multicast backbone (MBone), " IEEE Communications, vol. 35, pp. 224-229, 1999.
    • (1999) IEEE Communications , vol.35 , pp. 224-229
    • Almeroth, K.1    Ammar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.