2007
DOI: 10.1016/j.comcom.2006.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Efficient security mechanisms for overlay multicast based content delivery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2008
2008
2012
2012

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 23 publications
0
9
0
1
Order By: Relevance
“…Many techniques have been proposed for receiver access control-little attention, however, has been paid to the sender counterpart of the problem. Examples of receiver access control include scalable multicast key distribution (SMKD) [12], group access control architecture for secure multicast and anycast (Gothic) [13], CRBR [11], and receiver access control in PIM-SM [14]. Examples of solutions that provide access control for receivers and senders are authorization stamp [15], IGMP extension for authentication of receivers and senders (IGMP RAC & SAC) [16], and keyed hierarchical multicast routing protocol (KHIP) [17].…”
Section: Multicast Access Control: Taxonomymentioning
confidence: 98%
See 2 more Smart Citations
“…Many techniques have been proposed for receiver access control-little attention, however, has been paid to the sender counterpart of the problem. Examples of receiver access control include scalable multicast key distribution (SMKD) [12], group access control architecture for secure multicast and anycast (Gothic) [13], CRBR [11], and receiver access control in PIM-SM [14]. Examples of solutions that provide access control for receivers and senders are authorization stamp [15], IGMP extension for authentication of receivers and senders (IGMP RAC & SAC) [16], and keyed hierarchical multicast routing protocol (KHIP) [17].…”
Section: Multicast Access Control: Taxonomymentioning
confidence: 98%
“…CRBR provides both key management and access control in overlay multicast communications [11]. The main focus of this paper is on the access control part of CRBR.…”
Section: Certificate Revocation Based Group Re-keyingmentioning
confidence: 99%
See 1 more Smart Citation
“…The main objective of a secure group communication protocol is to ensure the data confidentiality against outsiders such that only legitimate group members can recover the group data. Existing solutions for wired networks [19][20][21] are not well suited for WMNs as they fail to take into consideration the multi-hop communication paradigm featured by WMNs, as well as the communication security among mesh clients within the coverage of a mesh router. These protocols also do not exploit unique features of WMNs, such as the broadcast nature of wireless communication.…”
Section: Key Management In Wmnsmentioning
confidence: 99%
“…Dos trabalhos existentes, que abordam a segurança em redes sobrepostas, destacase (ZHU et al, 2007), que cria mecanismos que lidam com dois problemas de segurança para multicast sobreposto: controle de acesso à rede e gerenciamento de chave de grupo. Além desses, apresenta um esquema de distribuição de chaves resiliente a DoS.…”
Section: Trabalhos Correlatosunclassified