INTERNET DRAFT July
نویسندگان
چکیده
This document provides a framework for group key management for multicast security, motivated by three main considerations, namely the multicast application, scalability and trust-relationships among entities. It introduces two planes corresponding to the network entities and functions important to multicasting and to security. The key management plane consists of two hierarchy-levels in the form of a single ’trunk region’ (inter-region) and one or more ’leaf regions’ (intra-region). These regions are defined to have unique group keys and are open to differing (inter-region or intra-region) group key management protocols. The advantages of the framework among others are that it is scalable, it has reduced complexity and allows the independence in regions of group key management. Hardjono, Cain, Doraswamy [Page 1] INTERNET DRAFT July 1998
منابع مشابه
INTERNET - DRAFT IPv 6 Addressing Architecture July 1997
This specification defines the addressing architecture of the IP Version 6 protocol [IPV6]. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node’s required addresses. draft-ietf-ipngwg-addr-arch-v2-02.txt [Page 1] INTERNET-DRAFT IPv6 Addressing Architecture July...
متن کاملInternet Draft Frame Relay Service MIB July 2 , 1993 Definitions of Managed Objects for Frame Relay Service July 2 , 1993 Frame Relay Service MIB Working Group
Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a "working draft" or "work in progress." Please check the I-D abstract listing contained in each Internet Draft directory to learn the current...
متن کاملInternet - Draft SIP SAML July 2008
This document specifies a Session Initiation Protocol (SIP) profile of Security Assertion Markup Language (SAML) as well as a SAML SIP binding. The defined SIP SAML Profile composes with the mechanisms defined in the SIP Identity specification and satisfy requirements presented in "Trait-based Authorization Requirements for the Session Initiation Protocol (SIP)". Tschofenig, et al. Expires Janu...
متن کاملInternet - Draft LISP Security July 2010
This draft analyses some of the threats against the security of the Locator/Identifier Separation Protocol and proposes a set of recommendations to mitigate some of the identified security risks.
متن کاملInternet - Draft SIP
Spam, defined as the transmission of bulk unsolicited messages, has plagued Internet email. Unfortunately, spam is not limited to email. It can affect any system that enables user to user communications. The Session Initiation Protocol (SIP) defines a system for user to user multimedia communications. Therefore, it is susceptible to spam, just as email is. In this document, we analyze the probl...
متن کامل