Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
ACM Transactions on Information and System Security (TISSEC)
Intrusion-Tolerant Group Management in Enclaves
Revised Papers from the 9th International Workshop on Security Protocols
Intrusion-Tolerant Group Management in Enclaves
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Relationship Management: Secure Collaboration in a Ubiquitous Environment
IEEE Pervasive Computing
Proving Secrecy is Easy Enough
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Role-based collaboration model of security devices
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Scalable secure one-to-many group communication using dual encryption
Computer Communications
Hi-index | 0.07 |
The rapid expansion of the Internet means that users increasingly want to interact with each other. Due to the openness and unsecure nature of the Net, users often have to rely on firewalls to protect their connections. Firewalls, however, make real-time interaction and collaboration more difficult. Firewalls are also complicated to configure and expensive to install and maintain, and they are inaccessible to small home offices and mobile users. The Enclaves approach is to transform user machines into “enclaves”, which are protected from outside interference and attacks. Using Enclaves, a group of collaborators can dynamically form a secure virtual subnet within which to conduct their joint business. This paper describes the design and implementation of the Enclaves toolkit and some applications we have built using the toolkit