Key storage in secure networks
Discrete Applied Mathematics
A matrix key-distribution scheme
Journal of Cryptology
Secret-key agreement without public-key
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Using encryption for authentication in large networks of computers
Communications of the ACM
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Java Distributed Computing
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Issues and Requirements for Internet-Scale Publish-Subscribe Systems
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 9 - Volume 9
Covert channels and anonymizing networks
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Scalable security and accounting services for content-based publish/subscribe systems
Proceedings of the 2005 ACM symposium on Applied computing
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Information hiding, anonymity and privacy: a modular approach
Journal of Computer Security - Special issue on WITS'02
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Hi-index | 0.00 |
We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and low complexity trust modules with each participant. The trust modules are used to protect group secrets and reduce susceptibility to denial of service attacks. We outline an architecture and elements of a protocol for Secure Collaborations over Message Boards (SCMB). The SCMB protocol can serve as a foundation over which a wide range of collaborative applications can be realised.