Secure Group Communications Over Data Networks (eBook)
XIX, 172 Seiten
Springer New York (Verlag)
978-0-387-22971-3 (ISBN)
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri- vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net- works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows.
Contents 6
List of Figures 10
List of Tables 13
Preface 14
Acknowledgments 16
Chapter 1 INTRODUCTION 17
1.1 Overview of Secure Group Communications 17
1.2 Preliminaries 19
1.3 Enabling Technologies 24
1.4 Group Dynamics and Security 29
1.5 Outline 31
Chapter 2 TYPICAL GROUP KEY MANAGEMENT SCHEMES 32
2.1 Classification of Typical Group Key Management Schemes 33
2.2 Public- Key based Secure Group Communication Schemes 35
2.3 Secret- Key based Secure Group Communication Schemes 38
2.4 Group Key Management based on Hierarchical Clusters 43
2.5 N- party Diffie- Hellman Key Exchange Suite 52
Chapter 3 TREE BASED KEY MANAGEMENT SCHEMES 63
3.1 Centralized Key Distribution based on Tree Structures 64
3.2 Distributed Key Agreement based on Tree Structures 90
Chapter 4 DYNAMIC CONFERENCING SCHEMES 104
4.1 Dynamic Conferencing and a Naive Solution 105
4.2 Public- Key based Dynamic Conferencing Scheme ( PKDC) 105
4.3 Chinese Remainder Theorem based ( Secure Lock) Dynamic Conferencing Scheme 106
4.4 Symmetric Polynomial based Dynamic Conferencing Scheme 107
4.5 Tree based Dynamic Conferencing Scheme 109
4.6 BF- TGDH based Distributed Dynamic Conferencing ( BF- TGDH DC) 114
4.7 Discussion and Comparisons 114
Chapter 5 SECURE GROUP COMMUNICATIONS WITH HIERARCHICAL ACCESS CONTROL 117
5.1 Classification 117
5.2 Unconditionally Secure Keying Schemes for Hierarchical Access Control 118
5.3 One- way Function based Schemes for Hierarchical Access Control 120
5.4 Index based Scheme for SGC with HAC 126
5.5 Chinese Remainder Theorem Based Scheme for SGC with HAC 134
Chapter 6 SGC CHALLENGES AND SGC FOR WIRELESS NETWORKS 139
6.1 Factors Enabling SGC Functionality 139
6.2 SGC in Wireless Environments 142
Chapter 7 CONCLUDING REMARKS 161
7.1 Summary of Book Contents 161
7.2 Exemplary Applications 162
7.3 Conclusion 163
References 165
About the Authors 173
Index 176
Erscheint lt. Verlag | 6.3.2007 |
---|---|
Zusatzinfo | XIX, 172 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Hardware | |
Naturwissenschaften | |
Technik ► Nachrichtentechnik | |
Schlagworte | ACCESS • Access Control • algorithms • Communication • computer network • Computer Science • Computer Security • cryptography • Development • Information • security |
ISBN-10 | 0-387-22971-X / 038722971X |
ISBN-13 | 978-0-387-22971-3 / 9780387229713 |
Haben Sie eine Frage zum Produkt? |
Größe: 8,2 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich