The X-Kernel: An Architecture for Implementing Network Protocols
IEEE Transactions on Software Engineering
The process group approach to reliable distributed computing
Communications of the ACM
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Horus: a flexible group communication system
Communications of the ACM
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
A reliable multicast framework for light-weight sessions and application level framing
IEEE/ACM Transactions on Networking (TON)
A Configurable Membership Service
IEEE Transactions on Computers
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Enclaves: enabling secure collaboration over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
ACM Transactions on Information and System Security (TISSEC)
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Enhancing Survivability of Security Services Using Redundanc
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Framework for Authentication and Access Control of Client-Server Group Communication Systems
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Intrusion-Tolerant Group Management in Enclaves
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
On context in authorization policy
Proceedings of the eighth ACM symposium on Access control models and technologies
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
Methods and limitations of security policy reconciliation
ACM Transactions on Information and System Security (TISSEC)
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Design security for internet-based workflow management systems adopting security agents
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
Secure attribute-based systems
Journal of Computer Security
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Tailoring consistency in group membership for mobile networks
Future Generation Computer Systems
Hi-index | 0.00 |
Many emerging applications on the Internet requiring group communication have varying security requirements. Significant strides have been made in achieving strong semantics and security guarantees within group environments. However, in existing solutions, the scope of available security policies is often limited. This paper presents Antigone, a framework that provides a suite of mechanisms from which flexible application security policies may be implemented. With Antigone, developers may choose a policy that best addresses their security and performance requirements. We describe the Antigone's mechanisms, consisting of a set of micro-protocols, and show how different security policies can be implemented using those mechanisms. We also present a performance study illustrating the security/performance tradeoffs that can be made using Antigone.