Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Key distribution for secure multimedia multicasts via data embedding
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
Computation-Efficient Multicast Key Distribution
IEEE Transactions on Parallel and Distributed Systems
The subset keys and identity tickets (SKIT) key distribution scheme
IEEE Transactions on Information Forensics and Security
Toward Cloud-Based Key Management for Outsourced Databases
COMPSACW '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
Research on Key Management Infrastructure in Cloud Computing Environment
GCC '10 Proceedings of the 2010 Ninth International Conference on Grid and Cloud Computing
Scalable data center multicast using multi-class Bloom Filter
ICNP '11 Proceedings of the 2011 19th IEEE International Conference on Network Protocols
Key management and distribution for secure multimedia multicast
IEEE Transactions on Multimedia
MDS array codes with independent parity symbols
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Exact Random Coding Exponents for Erasure Decoding
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.