Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Dynamic group key management protocol

Identifieur interne : 000953 ( PascalFrancis/Corpus ); précédent : 000952; suivant : 000954

Dynamic group key management protocol

Auteurs : Ghassan Chaddoud ; Isabelle Chrisment ; André Schaff

Source :

RBID : Pascal:01-0295847

Descripteurs français

English descriptors

Abstract

If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal1 as a solution to the scalability problems of key management in dynamic multicast group and show how Baal resolves the user's revocation problem. This protocol is based on distributed group key management by local controllers within sub-networks.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0302-9743
A05       @2 2052
A08 01  1  ENG  @1 Dynamic group key management protocol
A09 01  1  ENG  @1 Information assurance in computer networks : St. Petersburg, 21-23 May 2001
A11 01  1    @1 CHADDOUD (Ghassan)
A11 02  1    @1 CHRISMENT (Isabelle)
A11 03  1    @1 SCHAFF (André)
A12 01  1    @1 GORODETSKI (Vladimir I.) @9 ed.
A12 02  1    @1 SKORMIN (Victor A.) @9 ed.
A12 03  1    @1 POPYACK (Leonard J.) @9 ed.
A14 01      @1 LORIA - University of Nancy I, Campus Scientifique - BP239 @2 54506 Vandoeuvre-Les-Nancy @3 FRA @Z 1 aut. @Z 3 aut.
A14 02      @1 LORIA - University of Nancy II, Campus Scientifique - BP239 @2 54506 Vandoeuvre-Les-Nancy @3 FRA @Z 2 aut.
A20       @1 251-262
A21       @1 2001
A23 01      @0 ENG
A26 01      @0 3-540-42103-3
A43 01      @1 INIST @2 16343 @5 354000092401450250
A44       @0 0000 @1 © 2001 INIST-CNRS. All rights reserved.
A45       @0 21 ref.
A47 01  1    @0 01-0295847
A60       @1 P @2 C
A61       @0 A
A64 01  1    @0 Lecture notes in computer science
A66 01      @0 DEU
A66 02      @0 USA
C01 01    ENG  @0 If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal1 as a solution to the scalability problems of key management in dynamic multicast group and show how Baal resolves the user's revocation problem. This protocol is based on distributed group key management by local controllers within sub-networks.
C02 01  X    @0 001D02B04
C03 01  X  FRE  @0 Système réparti @5 01
C03 01  X  ENG  @0 Distributed system @5 01
C03 01  X  SPA  @0 Sistema repartido @5 01
C03 02  X  FRE  @0 Réseau local @5 02
C03 02  X  ENG  @0 Local network @5 02
C03 02  X  SPA  @0 Red local @5 02
C03 03  X  FRE  @0 Sécurité @5 03
C03 03  X  ENG  @0 Safety @5 03
C03 03  X  SPA  @0 Seguridad @5 03
C03 04  X  FRE  @0 Protocole transmission @5 05
C03 04  X  ENG  @0 Transmission protocol @5 05
C03 04  X  SPA  @0 Protocolo transmisión @5 05
C03 05  X  FRE  @0 Multidestinataire @5 10
C03 05  X  ENG  @0 Multicast @5 10
C03 05  X  SPA  @0 Multidestinatario @5 10
C03 06  X  FRE  @0 Authentification @5 18
C03 06  X  ENG  @0 Authentication @5 18
C03 06  X  SPA  @0 Autenticación @5 18
C03 07  X  FRE  @0 Confidentialité @5 19
C03 07  X  ENG  @0 Confidentiality @5 19
C03 07  X  SPA  @0 Confidencialidad @5 19
C03 08  X  FRE  @0 Extensibilité @4 CD @5 96
C03 08  X  ENG  @0 Scalability @4 CD @5 96
N21       @1 204
pR  
A30 01  1  ENG  @1 MMM-ACNS : methods, models and architectures for network security. International workshop @3 St. Petersburg RUS @4 2001-05-21

Format Inist (serveur)

NO : PASCAL 01-0295847 INIST
ET : Dynamic group key management protocol
AU : CHADDOUD (Ghassan); CHRISMENT (Isabelle); SCHAFF (André); GORODETSKI (Vladimir I.); SKORMIN (Victor A.); POPYACK (Leonard J.)
AF : LORIA - University of Nancy I, Campus Scientifique - BP239/54506 Vandoeuvre-Les-Nancy /France (1 aut., 3 aut.); LORIA - University of Nancy II, Campus Scientifique - BP239/54506 Vandoeuvre-Les-Nancy/France (2 aut.)
DT : Publication en série; Congrès; Niveau analytique
SO : Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2001; Vol. 2052; Pp. 251-262; Bibl. 21 ref.
LA : Anglais
EA : If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal1 as a solution to the scalability problems of key management in dynamic multicast group and show how Baal resolves the user's revocation problem. This protocol is based on distributed group key management by local controllers within sub-networks.
CC : 001D02B04
FD : Système réparti; Réseau local; Sécurité; Protocole transmission; Multidestinataire; Authentification; Confidentialité; Extensibilité
ED : Distributed system; Local network; Safety; Transmission protocol; Multicast; Authentication; Confidentiality; Scalability
SD : Sistema repartido; Red local; Seguridad; Protocolo transmisión; Multidestinatario; Autenticación; Confidencialidad
LO : INIST-16343.354000092401450250
ID : 01-0295847

Links to Exploration step

Pascal:01-0295847

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Dynamic group key management protocol</title>
<author>
<name sortKey="Chaddoud, Ghassan" sort="Chaddoud, Ghassan" uniqKey="Chaddoud G" first="Ghassan" last="Chaddoud">Ghassan Chaddoud</name>
<affiliation>
<inist:fA14 i1="01">
<s1>LORIA - University of Nancy I, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy </s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA - University of Nancy II, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy</s2>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Schaff, Andre" sort="Schaff, Andre" uniqKey="Schaff A" first="André" last="Schaff">André Schaff</name>
<affiliation>
<inist:fA14 i1="01">
<s1>LORIA - University of Nancy I, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy </s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">01-0295847</idno>
<date when="2001">2001</date>
<idno type="stanalyst">PASCAL 01-0295847 INIST</idno>
<idno type="RBID">Pascal:01-0295847</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000953</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Dynamic group key management protocol</title>
<author>
<name sortKey="Chaddoud, Ghassan" sort="Chaddoud, Ghassan" uniqKey="Chaddoud G" first="Ghassan" last="Chaddoud">Ghassan Chaddoud</name>
<affiliation>
<inist:fA14 i1="01">
<s1>LORIA - University of Nancy I, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy </s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA - University of Nancy II, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy</s2>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Schaff, Andre" sort="Schaff, Andre" uniqKey="Schaff A" first="André" last="Schaff">André Schaff</name>
<affiliation>
<inist:fA14 i1="01">
<s1>LORIA - University of Nancy I, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy </s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint>
<date when="2001">2001</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Authentication</term>
<term>Confidentiality</term>
<term>Distributed system</term>
<term>Local network</term>
<term>Multicast</term>
<term>Safety</term>
<term>Scalability</term>
<term>Transmission protocol</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Système réparti</term>
<term>Réseau local</term>
<term>Sécurité</term>
<term>Protocole transmission</term>
<term>Multidestinataire</term>
<term>Authentification</term>
<term>Confidentialité</term>
<term>Extensibilité</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal
<sup>1</sup>
as a solution to the scalability problems of key management in dynamic multicast group and show how Baal resolves the user's revocation problem. This protocol is based on distributed group key management by local controllers within sub-networks.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0302-9743</s0>
</fA01>
<fA05>
<s2>2052</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG">
<s1>Dynamic group key management protocol</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG">
<s1>Information assurance in computer networks : St. Petersburg, 21-23 May 2001</s1>
</fA09>
<fA11 i1="01" i2="1">
<s1>CHADDOUD (Ghassan)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>CHRISMENT (Isabelle)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>SCHAFF (André)</s1>
</fA11>
<fA12 i1="01" i2="1">
<s1>GORODETSKI (Vladimir I.)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1">
<s1>SKORMIN (Victor A.)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="03" i2="1">
<s1>POPYACK (Leonard J.)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01">
<s1>LORIA - University of Nancy I, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy </s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>LORIA - University of Nancy II, Campus Scientifique - BP239</s1>
<s2>54506 Vandoeuvre-Les-Nancy</s2>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA20>
<s1>251-262</s1>
</fA20>
<fA21>
<s1>2001</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA26 i1="01">
<s0>3-540-42103-3</s0>
</fA26>
<fA43 i1="01">
<s1>INIST</s1>
<s2>16343</s2>
<s5>354000092401450250</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2001 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>21 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>01-0295847</s0>
</fA47>
<fA60>
<s1>P</s1>
<s2>C</s2>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01">
<s0>DEU</s0>
</fA66>
<fA66 i1="02">
<s0>USA</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal
<sup>1</sup>
as a solution to the scalability problems of key management in dynamic multicast group and show how Baal resolves the user's revocation problem. This protocol is based on distributed group key management by local controllers within sub-networks.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02B04</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Système réparti</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Distributed system</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Sistema repartido</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Réseau local</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Local network</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Red local</s0>
<s5>02</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Sécurité</s0>
<s5>03</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Safety</s0>
<s5>03</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Seguridad</s0>
<s5>03</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Protocole transmission</s0>
<s5>05</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Transmission protocol</s0>
<s5>05</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Protocolo transmisión</s0>
<s5>05</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Multidestinataire</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Multicast</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Multidestinatario</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Authentification</s0>
<s5>18</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Authentication</s0>
<s5>18</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Autenticación</s0>
<s5>18</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Confidentialité</s0>
<s5>19</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Confidentiality</s0>
<s5>19</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Confidencialidad</s0>
<s5>19</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Extensibilité</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Scalability</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fN21>
<s1>204</s1>
</fN21>
</pA>
<pR>
<fA30 i1="01" i2="1" l="ENG">
<s1>MMM-ACNS : methods, models and architectures for network security. International workshop</s1>
<s3>St. Petersburg RUS</s3>
<s4>2001-05-21</s4>
</fA30>
</pR>
</standard>
<server>
<NO>PASCAL 01-0295847 INIST</NO>
<ET>Dynamic group key management protocol</ET>
<AU>CHADDOUD (Ghassan); CHRISMENT (Isabelle); SCHAFF (André); GORODETSKI (Vladimir I.); SKORMIN (Victor A.); POPYACK (Leonard J.)</AU>
<AF>LORIA - University of Nancy I, Campus Scientifique - BP239/54506 Vandoeuvre-Les-Nancy /France (1 aut., 3 aut.); LORIA - University of Nancy II, Campus Scientifique - BP239/54506 Vandoeuvre-Les-Nancy/France (2 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2001; Vol. 2052; Pp. 251-262; Bibl. 21 ref.</SO>
<LA>Anglais</LA>
<EA>If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal
<sup>1</sup>
as a solution to the scalability problems of key management in dynamic multicast group and show how Baal resolves the user's revocation problem. This protocol is based on distributed group key management by local controllers within sub-networks.</EA>
<CC>001D02B04</CC>
<FD>Système réparti; Réseau local; Sécurité; Protocole transmission; Multidestinataire; Authentification; Confidentialité; Extensibilité</FD>
<ED>Distributed system; Local network; Safety; Transmission protocol; Multicast; Authentication; Confidentiality; Scalability</ED>
<SD>Sistema repartido; Red local; Seguridad; Protocolo transmisión; Multidestinatario; Autenticación; Confidencialidad</SD>
<LO>INIST-16343.354000092401450250</LO>
<ID>01-0295847</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000953 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000953 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:01-0295847
   |texte=   Dynamic group key management protocol
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022