Multicast and group security /
Saved in:
Author / Creator: | Hardjono, Thomas. |
---|---|
Imprint: | Boston : Artech House, ©2003. |
Description: | 1 online resource (xxii, 307 pages) : illustrations. |
Language: | English |
Series: | Artech House computer security series Artech House computer security series. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11126847 |
Table of Contents:
- Foreword
- Preface
- Acknowledgments
- 1. Introduction
- 1.1. Motivation for multicast security
- 1.2. Multicast content protection
- 1.3. Infrastructure protection
- 1.4. Applications of secure multicasting
- 1.5. Road map
- References
- 2. Framework for multicast and group security
- 2.1. The problem scope of multicast security
- 2.2. Fundamental issues
- 2.3. Transport and applications issues
- 2.4. The IETF problem scope for multicast and group security
- 2.5. Three problem areas in the management of keying material
- 2.6. The building blocks approach
- 2.7. Summary
- References
- 3. Multicast data authentication
- 3.1. Issues in multicast data authentication
- 3.2. Digital signatures for source authentication
- 3.3. Hash chaining to authenticate streaming data
- 3.4. MAC-based source authentication of unreliable streams
- 3.5. IPsec ESP and MESP
- 3.6. Summary
- References
- 4. Introduction to group key management
- 4.1. A model for group key management
- 4.2. Requirements in group key management
- 4.3. Security requirements of group key management
- 4.4. GSA management
- 4.5. Classification of the group key management problem
- 4.6. Summary
- References
- 5. Architectures and protocols for group key management
- 5.1. Architectural issues and motivations
- 5.2. IKAM
- 5.3. Iolus
- 5.4. Key distribution protocols
- 5.5. Summary
- References
- 6. Group key management algorithms
- 6.1. Batch and periodic rekeying
- 6.2. MARKS
- 6.3. LKH
- 6.4. OFT
- 6.5. Batch processing of membership changes in key trees
- 6.6. Reliable transport of rekey messages
- 6.7. Stateless key revocation algorithms
- 6.8. Summary
- References
- 7. Group security policy
- 7.1. Group security policy framework
- 7.2. Classification of group security policy
- 7.3. Group security policy specification
- 7.4. Policy negotiation and reconciliation
- 7.5. Group security policy enforcement
- 7.6. Summary
- References
- 8. Securing multicast routing protocols
- 8.1. The three components of multicast security
- 8.2. Overview of multicast routing
- 8.3. Security requirements in unicast and multicast routing
- 8.4. PIM-SM security
- 8.5. MSDP security
- 8.6. IGMP security
- 8.7. Security in other routing protocols
- 8.8. Summary
- References
- 9. Security in Reliable Multicast protocols
- 9.1. Classification of RM protocols
- 9.2. Generic security requirements for RM protocols
- 9.3. Security of TRACK protocols
- 9.4. Security of NORM protocols
- 9.5. Security of FEC-based protocols
- 9.6. Summary
- References
- 10. Applications of multicast and their security
- 10.1. Stock market data distribution
- 10.2. Local area IP Television
- 10.3. Nonreal-time multicast distribution
- 10.4. SecureGroups project
- 10.5. Summary
- References
- 11. Conclusion and future work
- 11.1. IETF multicast security framework
- 11.2. Secure multicast data transmission
- 11.3. Group key distribution
- 11.4. Policy
- 11.5. Infrastructure protection
- 11.6. Future direction and final words
- Glossary
- About the Authors
- Index