Multicast and group security /

Saved in:
Bibliographic Details
Author / Creator:Hardjono, Thomas.
Imprint:Boston : Artech House, ©2003.
Description:1 online resource (xxii, 307 pages) : illustrations.
Language:English
Series:Artech House computer security series
Artech House computer security series.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11126847
Hidden Bibliographic Details
Other authors / contributors:Dondeti, Lakshminath R.
ISBN:158053659X
9781580536592
1580533426
Notes:Includes bibliographical references and index.
Print version record.
Summary:A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Other form:Print version: Hardjono, Thomas. Multicast and group security. Boston : Artech House, ©2003 1580533426
Table of Contents:
  • Foreword
  • Preface
  • Acknowledgments
  • 1. Introduction
  • 1.1. Motivation for multicast security
  • 1.2. Multicast content protection
  • 1.3. Infrastructure protection
  • 1.4. Applications of secure multicasting
  • 1.5. Road map
  • References
  • 2. Framework for multicast and group security
  • 2.1. The problem scope of multicast security
  • 2.2. Fundamental issues
  • 2.3. Transport and applications issues
  • 2.4. The IETF problem scope for multicast and group security
  • 2.5. Three problem areas in the management of keying material
  • 2.6. The building blocks approach
  • 2.7. Summary
  • References
  • 3. Multicast data authentication
  • 3.1. Issues in multicast data authentication
  • 3.2. Digital signatures for source authentication
  • 3.3. Hash chaining to authenticate streaming data
  • 3.4. MAC-based source authentication of unreliable streams
  • 3.5. IPsec ESP and MESP
  • 3.6. Summary
  • References
  • 4. Introduction to group key management
  • 4.1. A model for group key management
  • 4.2. Requirements in group key management
  • 4.3. Security requirements of group key management
  • 4.4. GSA management
  • 4.5. Classification of the group key management problem
  • 4.6. Summary
  • References
  • 5. Architectures and protocols for group key management
  • 5.1. Architectural issues and motivations
  • 5.2. IKAM
  • 5.3. Iolus
  • 5.4. Key distribution protocols
  • 5.5. Summary
  • References
  • 6. Group key management algorithms
  • 6.1. Batch and periodic rekeying
  • 6.2. MARKS
  • 6.3. LKH
  • 6.4. OFT
  • 6.5. Batch processing of membership changes in key trees
  • 6.6. Reliable transport of rekey messages
  • 6.7. Stateless key revocation algorithms
  • 6.8. Summary
  • References
  • 7. Group security policy
  • 7.1. Group security policy framework
  • 7.2. Classification of group security policy
  • 7.3. Group security policy specification
  • 7.4. Policy negotiation and reconciliation
  • 7.5. Group security policy enforcement
  • 7.6. Summary
  • References
  • 8. Securing multicast routing protocols
  • 8.1. The three components of multicast security
  • 8.2. Overview of multicast routing
  • 8.3. Security requirements in unicast and multicast routing
  • 8.4. PIM-SM security
  • 8.5. MSDP security
  • 8.6. IGMP security
  • 8.7. Security in other routing protocols
  • 8.8. Summary
  • References
  • 9. Security in Reliable Multicast protocols
  • 9.1. Classification of RM protocols
  • 9.2. Generic security requirements for RM protocols
  • 9.3. Security of TRACK protocols
  • 9.4. Security of NORM protocols
  • 9.5. Security of FEC-based protocols
  • 9.6. Summary
  • References
  • 10. Applications of multicast and their security
  • 10.1. Stock market data distribution
  • 10.2. Local area IP Television
  • 10.3. Nonreal-time multicast distribution
  • 10.4. SecureGroups project
  • 10.5. Summary
  • References
  • 11. Conclusion and future work
  • 11.1. IETF multicast security framework
  • 11.2. Secure multicast data transmission
  • 11.3. Group key distribution
  • 11.4. Policy
  • 11.5. Infrastructure protection
  • 11.6. Future direction and final words
  • Glossary
  • About the Authors
  • Index