Secure Group Communications Over Data Networks (eBook)

eBook Download: PDF
2007 | 2005
XIX, 172 Seiten
Springer New York (Verlag)
978-0-387-22971-3 (ISBN)

Lese- und Medienproben

Secure Group Communications Over Data Networks - Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri­ vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net­ works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows.
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri- vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net- works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows.

Contents 6
List of Figures 10
List of Tables 13
Preface 14
Acknowledgments 16
Chapter 1 INTRODUCTION 17
1.1 Overview of Secure Group Communications 17
1.2 Preliminaries 19
1.3 Enabling Technologies 24
1.4 Group Dynamics and Security 29
1.5 Outline 31
Chapter 2 TYPICAL GROUP KEY MANAGEMENT SCHEMES 32
2.1 Classification of Typical Group Key Management Schemes 33
2.2 Public- Key based Secure Group Communication Schemes 35
2.3 Secret- Key based Secure Group Communication Schemes 38
2.4 Group Key Management based on Hierarchical Clusters 43
2.5 N- party Diffie- Hellman Key Exchange Suite 52
Chapter 3 TREE BASED KEY MANAGEMENT SCHEMES 63
3.1 Centralized Key Distribution based on Tree Structures 64
3.2 Distributed Key Agreement based on Tree Structures 90
Chapter 4 DYNAMIC CONFERENCING SCHEMES 104
4.1 Dynamic Conferencing and a Naive Solution 105
4.2 Public- Key based Dynamic Conferencing Scheme ( PKDC) 105
4.3 Chinese Remainder Theorem based ( Secure Lock) Dynamic Conferencing Scheme 106
4.4 Symmetric Polynomial based Dynamic Conferencing Scheme 107
4.5 Tree based Dynamic Conferencing Scheme 109
4.6 BF- TGDH based Distributed Dynamic Conferencing ( BF- TGDH DC) 114
4.7 Discussion and Comparisons 114
Chapter 5 SECURE GROUP COMMUNICATIONS WITH HIERARCHICAL ACCESS CONTROL 117
5.1 Classification 117
5.2 Unconditionally Secure Keying Schemes for Hierarchical Access Control 118
5.3 One- way Function based Schemes for Hierarchical Access Control 120
5.4 Index based Scheme for SGC with HAC 126
5.5 Chinese Remainder Theorem Based Scheme for SGC with HAC 134
Chapter 6 SGC CHALLENGES AND SGC FOR WIRELESS NETWORKS 139
6.1 Factors Enabling SGC Functionality 139
6.2 SGC in Wireless Environments 142
Chapter 7 CONCLUDING REMARKS 161
7.1 Summary of Book Contents 161
7.2 Exemplary Applications 162
7.3 Conclusion 163
References 165
About the Authors 173
Index 176

Erscheint lt. Verlag 6.3.2007
Zusatzinfo XIX, 172 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Naturwissenschaften
Technik Nachrichtentechnik
Schlagworte ACCESS • Access Control • algorithms • Communication • computer network • Computer Science • Computer Security • cryptography • Development • Information • security
ISBN-10 0-387-22971-X / 038722971X
ISBN-13 978-0-387-22971-3 / 9780387229713
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99