Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Role-Based Access Control Models
Computer
A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Enabling conferencing applications on the internet using an overlay muilticast architecture
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Scalable IP Multicast Sender Access Control for Bi-directional Trees
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Router-Assistance for Receiver Access Control in PIM-SM
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
OMNI: an efficient overlay multicast infrastructure for real-time applications
Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications
Efficient security mechanisms for overlay multicast based content delivery
Computer Communications
ALMI: an application level multicast infrastructure
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
Short Survey: A survey of application level multicast techniques
Computer Communications
Hi-index | 0.00 |
In multicast communications, where service providers distribute services such as streaming multimedia, distributed databases, and etc., an important issue is to control the access to both the transmitted data and the network resources. This issue becomes more complicated when the multicast communication takes place in a hierarchical organizational structure, such as the military. In this paper, we analyze the multicast security issues and propose a new approach to securing hierarchical multicast communications. Specifically, we specify requirements for developing access control policies in hierarchical multicast communications and propose a model for enforcing such policies. Our approach is based on the well-known role-based access control model. We show that our approach is simple, but yet is very flexible, scalable, and effective in controlling the access to the transmitted data as well as to the shared secret key, used in providing data confidentiality.