메뉴 건너뛰기




Volumn , Issue , 2011, Pages 3-9

An efficient key management for secure multicast in Sensor-Cloud

Author keywords

Dissemination; Publish subscribe; Secure multicast; Sensor cloud

Indexed keywords

DATA DELIVERY; DISSEMINATION; KEY MANAGEMENT; PUBLISH/SUBSCRIBE; PUBLISH/SUBSCRIBE SYSTEM; SECURE DATA; SECURE MULTICASTS; SENSOR-CLOUD;

EID: 80051658018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNSI.2011.27     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 1
    • 78649327336 scopus 로고    scopus 로고
    • Ripple: A publish/subscribe service for multidata item updates propagation in the cloud
    • Vol. in Press, Corrected Proof, pp. -, [Online]. Available
    • Y. Zhu, J. Wang, and C. Wang, "Ripple: A publish/subscribe service for multidata item updates propagation in the cloud, " Journal of Network and Computer Applications, vol. In Press, Corrected Proof, pp. -, 2010. [Online]. Available:http://www.sciencedirect.com/science/article/B6WKB-508X3MK- 1/2/764c9645e3ce1bc875e021d9853d1370.
    • (2010) Journal of Network and Computer Applications
    • Zhu, Y.1    Wang, J.2    Wang, C.3
  • 3
    • 80051657407 scopus 로고    scopus 로고
    • Sati: A scalable and traffic-efficient data delivery infrastructure for real-time sensing applications
    • vol. In Press, Corrected Proof,pp. -, [Online]. Available
    • K. Cho, Y. Ju, S. Jo, Y. Rhee, and J. Song, "Sati: A scalable and traffic-efficient data delivery infrastructure for real-time sensing applications, " Computer Networks, vol. In Press, Corrected Proof, pp. -, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/B6VRG- 50W8123-1/2/dddebd98ec3a4a819a03b9c6b8f9285f.
    • (2010) Computer Networks
    • Cho, K.1    Ju, Y.2    Jo, S.3    Rhee, Y.4    Song, J.5
  • 6
    • 0345565888 scopus 로고    scopus 로고
    • The many faces of publish/subscribe
    • June, [Online]. Available
    • P. T. Eugster, P. A. Felber, R. Guerraoui, and A.-M. Kermarrec, "The many faces of publish/subscribe, " ACM Comput. Surv., vol. 35, pp. 114-131, June 2003. [Online]. Available: http://doi.acm.org/10.1145/857076. 857078.
    • (2003) ACM Comput. Surv. , vol.35 , pp. 114-131
    • Eugster, P.T.1    Felber, P.A.2    Guerraoui, R.3    Kermarrec, A.-M.4
  • 7
    • 70350526999 scopus 로고    scopus 로고
    • Scalable key management algorithms for locationbased services
    • October, [Online]. Available
    • M. Srivatsa, A. Iyengar, J. Yin, and L. Liu, "Scalable key management algorithms for locationbased services, " IEEE/ACM Trans. Netw., vol. 17, pp. 1399-1412, October 2009. [Online]. Available: http://dx.doi.org/10. 1109/TNET.2008.2010222.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , pp. 1399-1412
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 8
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • September, [Online]. Available
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication, " ACM Comput. Surv., vol. 35, pp. 309-329, September 2003. [Online]. Available: http://doi.acm.org/10.1145/937503.937506.
    • (2003) ACM Comput. Surv. , vol.35 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 10
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • DOI 10.1109/90.836475
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs, " IEEE/ACM Trans. Netw., vol. 8, pp. 16-30, February 2000. [Online]. Available: http://dx.doi.org/10.1109/90.836475. (Pubitemid 30584705)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 11
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • A. Sherman and D. McGrew, "Key establishment in large dynamic groups using one-way function trees, " Software Engineering, IEEE Transactions on, vol. 29, no. 5, pp. 444 - 458, May 2003.
    • (2003) Software Engineering, IEEE Transactions on , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.1    McGrew, D.2
  • 12
    • 72549116358 scopus 로고    scopus 로고
    • Computationand- storage-efficient key tree management protocol for secure multicast communications
    • [Online]. Available
    • D.-H. Je, J.-S. Lee, Y. Park, and S.-W. Seo, "Computationand- storage-efficient key tree management protocol for secure multicast communications, " Computer Communications, vol. 33, no. 2, pp. 136 - 148, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/B6TYP- 4X1SBCM-1/2/15372974ea6466e9e5da3e6899c8f498.
    • (2010) Computer Communications , vol.33 , Issue.2 , pp. 136-148
    • Je, D.-H.1    Lee, J.-S.2    Park, Y.3    Seo, S.-W.4
  • 14
    • 78149471625 scopus 로고    scopus 로고
    • A dynamic and fast event matching algorithm for a content-based publish/subscribe information dissemination system in sensor-grid
    • 10.1007/s11227-009-0327-0. [Online]. Available
    • M. Hassan, B. Song, and E.-N. Huh, "A dynamic and fast event matching algorithm for a content-based publish/subscribe information dissemination system in sensor-grid, " The Journal of Supercomputing, pp. 1- 36, 2009, 10.1007/s11227-009-0327-0. [Online]. Available: http://dx.doi.org/10.1007/s11227-009-0327-0.
    • (2009) The Journal of Supercomputing , pp. 1-36
    • Hassan, M.1    Song, B.2    Huh, E.-N.3
  • 15
    • 31044454785 scopus 로고    scopus 로고
    • A security framework for content-based publish-subscribe system
    • July 2006. [Online]. Available
    • G. Padmavathi and S. Annadurai, "A security framework for content-based publish-subscribe system, " Electron. Commer. Rec. Appl., vol. 5, pp. 78-90, July 2006. [Online]. Available: http://dx.doi.org/10.1016/j. elerap.2005.09.001.
    • Electron. Commer. Rec. Appl. , vol.5 , pp. 78-90
    • Padmavathi, G.1    Annadurai, S.2
  • 16
    • 33745793594 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • DOI 10.1145/1102120.1102147, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • M. J. Atallah, K. B. Frikken, and M. Blanton, "Dynamic and efficient key management for access hierarchies, " in Proceedings of the 12th ACM conference on Computer and communications security, ser. CCS '05. New York, NY, USA: ACM, 2005, pp. 190-202. [Online]. Available: http://doi.acm.org/10.1145/ 1102120.1102147. (Pubitemid 44022003)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 190-202
    • Atallah, M.J.1    Frikken, K.B.2    Blanton, M.3
  • 18
    • 1442357062 scopus 로고    scopus 로고
    • US Secure Hash Algorithm 1 (SHA1)
    • September, updated by RFC 4634.[Online]. Available
    • D. Eastlake 3rd and P. Jones, "US Secure Hash Algorithm 1 (SHA1), " RFC 3174 (Informational), Internet Engineering Task Force, September 2001, updated by RFC 4634.[Online]. Available: http://www.ietf.org/rfc/rfc3174. txt.
    • (2001) RFC 3174 (Informational)
    • Eastlake III, D.1    Jones, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.