نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

Journal: :JCIT 2010
Huy Hoang Ngo Xianping Wu Phu Dung Le Bala Srinivasan

Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Although many access control methods utilize both individuals and groups while validating authorization,...

1998
Ahmed S. Corson J. Baras

This paper presents a robust, scalable extension to the recently proposed multicast Group Key Management Protocol (GKMP) ([1], [2]), in terms of security administration. The GKMP has two major security related problems, (a) lack of any mechanism to remove a compromised group administrator, (b) lack of scalability. We are able to remove a compromised single panel member from generating the group...

2003
Feng Zhu Agnes Chan Guevara Noubir

As applications of secure multicast in networks continue to grow, the demand for an efficient scheme to manage group keys for secure group communication becomes more urgent. In this paper, we propose a new key tree structure for group key management. With this optimal tree structure, system resources such as network bandwidth can be saved. We devise an algorithm to generate this optimal tree an...

2009
Ning Shang Mohamed Nabeel Federica Paci Elisa Bertino

We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to whom the documents are delivered and is based on an efficient and novel group key management scheme. Our document broadcasting approach is based on access control policies specifying which users can access which documents, or subdocuments. Based on such policies, a b...

Journal: :IACR Cryptology ePrint Archive 2007
Ling Cheung Joseph A. Cooley Roger I. Khazan Calvin C. Newport

This paper illustrates the use of ciphertext-policy attributebased encryption (CP-ABE), a recently proposed primitive, in the setting of group key management. Specifically, we use the CP-ABE scheme of Bethencourt, Sahai and Waters to implement flat table group key management. Unlike past implementations of flat table, our proposal is resistant to collusion attacks. We also provide efficient mec...

2001
Seok Joo Koh Juyoung Park Eunsook Kim Shin Gak Kang

 This paper describes the transport session management (TSM) architecture and mechanisms for one-tomany multicast sessions. TSM is one of the crucial components for the multicast transport protocols, along with the reliability management. The main purpose of TSM is to maintain an active Transport Session stable and desirable. TSM is also extended to support the effective billing/charging and t...

2017
S. Jabeen Begum T. Purusothaman Xiaozhou Steve Li Yang Richard Yang Mohamed G. Gouda Simon S. Lam Gary Chan Wei-Chi Ku Shuai-Min Chen Yair Amir John L. Schultz Michael R. Lyu

Providing key management schemes for large scale multicast groups has become a bottleneck due to many potential commercial applications on Internet such as stock quote and software distribution. For secure multicast communication, all the group members share a common key called as Secret Group Key. Since the member dynamics such as join or leave do not necessarily terminate the multicast sessio...

Journal: :CoRR 2009
Eric Ke Wang Lucas Chi Kwong Hui Siu-Ming Yiu

Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...

Journal: :SIAM J. Discrete Math. 2007
Ronald L. Graham Minming Li F. Frances Yao

We investigate the key management problem for broadcasting applications. Previous work showed that batch rekeying can be more cost-effective than individual rekeying. Under the assumption that every user has probability p of being replaced by a new user during a batch rekeying period, we study the structure of the optimal key trees. Constant bounds on both the branching degree and the subtree s...

2004
Ayan Roy Chowdhury John S. Baras

This paper proposes a design for key management for secure multicast in hybrid satellite networks. Communication satellites offer an efficient way to extend IP multicast services for groups in wide-area networks. In order to be commercially viable, the multicast traffic should be accessible only to paying subscribers. Access control can be achieved by data encryption. This requires secure and e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید