Secure and efficient key management for dynamic multicast groups
ACM SIGOPS Operating Systems Review
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Hi-index | 0.00 |
This article describes a key derivation method that greatly simplifies key distribution issues for network management (NM) applications and may in some cases relieve NM stations from the need to store any keys at all. This method is easily generalized for network protocols and applications where several “masters” need to talk to a large number of “slaves”. It shows a way to cut down on the amount of keys stored with little impact on security. This is especially important when human users are involved