[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Judge et al., 2002 - Google Patents

Gothic: A group access control architecture for secure multicast and anycast

Judge et al., 2002

View PDF
Document ID
1328272538382228825
Author
Judge P
Ammar M
Publication year
Publication venue
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies

External Links

Snippet

Multicast and anycast have received considerable attention due to their ability to support networked services. There are distinct and significant security vulnerabilities in both the multicast and anycast model including denial of service, theft or service, eavesdropping, and …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Judge et al. Gothic: A group access control architecture for secure multicast and anycast
Dondeti et al. Scalable secure one-to-many group communication using dual encryption
Canetti et al. Multicast security: A taxonomy and some efficient constructions
Dondeti et al. A dual encryption protocol for scalable secure multicasting
Kruus et al. Techniques and issues in multicast security
US8230010B1 (en) System, device, and method for controlling access in a multicast communication network
Castellucia et al. Securing group management in IPv6 with cryptographically generated addresses
US8688077B2 (en) Communication system and method for providing a mobile communications service
Mohamed et al. OMAC: a new access control architecture for overlay multicast communications
Dunigan et al. Group key management
Pimentel et al. OCP: A protocol for secure communication in federated content networks
WO2006088751A2 (en) Access control for mobile multicast
Gharout et al. Key management with host mobility in dynamic groups
Tomar et al. Secure Group Key Agreement with Node Authentication
Islam et al. Sender access control in IP multicast
Dondeti Efficient private group communication over public networks
Jiang et al. A novel mix-based location privacy mechanism in Mobile IPv6
Ueno et al. A receiver authentication and group key delivery protocol for secure multicast
Fathi et al. Protocols for purpose-restricted anonymous communications in IP-based wireless networks
Islam et al. Sender access and data distribution control for inter-domain multicast groups
Aiash A Comprehensive Security Framework for Heterogeneous IoTs
Aura et al. Communications security on the Internet
Varadarajan et al. Dynamic, distributed, secure multicast in active networks
Aye et al. A key distribution scheme for secure multicast over ipv6 wireless networks
Park et al. Internetwork access control using public key certificates