Elements of trusted multicasting
- 17 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Multicast is rapidly becoming an important mode of communication as well as a good platform for building group-oriented services. However, to be used for trusted communication, current multicast schemes must be supplemented by mechanisms for protecting traffic, controlling participation, and restricting access of unauthorized users to the data exchanged by the participants. We consider fundamental security issues in building a trusted multicast facility. We discuss techniques for group-based data encryption, authentication of participants, and preventing unauthorized transmissions and receptions.<>Keywords
This publication has 14 references indexed in Scilit:
- Multicast routing of hierarchical dataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Preventing denial and forgery of causal relationships in distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Experimental Internet Stream Protocol: Version 2 (ST-II)Published by RFC Editor ,1990
- Multicast routing in datagram internetworks and extended LANsACM Transactions on Computer Systems, 1990
- A matrix key-distribution schemeJournal of Cryptology, 1990
- Reliable communication in the presence of failuresACM Transactions on Computer Systems, 1987
- Distributed process groups in the V KernelACM Transactions on Computer Systems, 1985
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978