IP multicast security: Issues and directions
Tóm tắt
Từ khóa
Tài liệu tham khảo
Waitzman (D.), Partridge (C), Deering (S.). “Distance vector multicast routing protocol,”RFC 1075, ietf, 1988.
Ballardie (T.), Francis (P.), Crowcroft (J.), “Core based trees: An architecture for scalable inter-domain multicast routing,”in Proceedings of ACM SIGCOMM’93, (San Francisco), pp. 85–95, ACM, 1993.
Deering (S.), Estrin (D.), Farinacci (D.), Handley (M.), Helmy (A.), Jacobson (V), LIU (C), Sharma (P.), Thaler (D.), Wei (L.), “Protocol Independent Multicast — Sparse Mode: Motivations and architecture,” draft-IETF-pim-arch-05.txt (Work in Progress), Aug 1998.
Cain (B.), Deering (S.), Thyagarajan (A.), “Internet group management protocol version 3,” draft-ietf-idmr-igmp-v3-Oi.txt (Work in Progress), Feb 1999.
Hardjono (T.), “Secure Multicast Group (SMuG) Reference Framework,” http://uuu.ipmulticast.com/community/smug (irtf Work in Progress), March 1999.
Canetti (R.), Pinkas (B.), “A taxonomy of multicast security issues,” draft-canetti-secure-multicast-taxonomy-01. txt (Work in Progress), Nov 1998.
Hardjono (T.), Cain (B.), Doraswamy (N.), “A framework for group key management for multicast security,” draft-IETF-ipsec-gkmframework-01.txt (Work in Progress), Feb 1999.
Mittra (S.), “The lolus framework for scalable secure multicasting,”in Proceedings of ACM SIGCOMM’97, pp. 277–288, acm, 1997.
Wallner (D.), Harder (E.), Agée (R.), “Key management for multicast: Issues and architectures,” draft-wallner-key-arch-01. txt (Work in Progress), Sept 1998.
Simmons (G.J.), “An introduction to shared secret and/or shared control schemes and their application,”in Contemporary Cryptology: The Science of Information Integrity (Simmons G.J., ed.), pp. 441–497, IEEE Press, 1992.
Balenson (D.), McGrew (D.), Sherman (A.), “Key management for large dynamic groups: One-way function trees and amortized initialization.” draft-balenson-groupkeymgmt-oft-00. txt (Work in Progress). Feb 1999.
Harney (H.), Muckenhirn (C), “Group key management protocol (GKMP) specification.”rfc 2093, ietf, July 1997.
Harney (H.), Muckenhirn (C), “Group key management protocol (GKMP) architecture.”rfc 2094, ietf. July 1997.
Harkjns (D.), Doraswamy (N.). “A secure scalable multicast key management protocol (mk.mp),” (Work in Progress), November 1997.
Ballardie (A.), Cain (B.), Zhang (Z.), “Core Based Trees (cbt version 3) multicast routing,” draft-IETF-idmr-cbt-spec-v3-01. txt (Work in Progress), August 1998.
Hardjono (T.), Cain (B.), Monga (I.), “Intra-domain group key management protocol,” draft-IETF-ipsec-intragkm-00.txt (Work in Progress), Nov 1998.
Handley (M.), Thaler (D.), Estrin (D.), “The internet multicast address allocation architecture,” draft-handley-malloc-arch-00.txt (Work in Progress), Dec 1997.
Canetti (R.), Cheng (P.), Pendarakis (D.), Rao (J.), Rohatgi (P.), Saha (D.), “An architecture for secure internet multicast.” draft-irtf-smug-sec-mcast-arch-00.txt (Work in Progress), Feb 1999.
Harney (H.), Harder (E.), “Group security association key management protocol,” draft-harney-sparta-gsnkmp-sec-00.txt (Work in Progress). Apr 1999.
Wong (C.K.), Gouda (M.), Lam (S.), “Secure group communications using key graphs,”in Proceedings of ACM SIGCOMM’9S, acm, 1998.
Chang (I.), Engel (R.), Kandlur (D.), Pendarakis (D.), andSaha (D.), “Key management for secure internet multicast using boolean function minimization techniques,”in Proceedings of Infocom ’99, (New York), IEEE, March 1999.
Canetti (R.), Malkin (T.), Nissim (K.), “Efficient communication-storage tradeoffs for multicast encryption,”in Proceedings of Eurocrypt’99, Springer-Verlag, 1999.
Harney (H.), Harder (E.), “Logical Key hierarchy (LKH) protocol, draft-harney-sparta-lkhp-sec-00.txt (Work in Progress), Mar 1999.
Harney (H.), Harder (E.), “Multicast Security Management Protocol (MSMP) requirements and policy,” draft-harney-sparta-msmp-sec-00.txt (Work in Progress), Mar 1999.
Kent (S.), Atkinson (R.), “Security architecture for the Internet Protocol,”RFC 2401, ietf, Nov 1998.
Perlman (R.), “Network layer protocols with byzantine robustness”,Technical Report mit/lcs/tr-429, Massachusetts Institute of Technology, October 1988.
Murphy (S.L.), Badger (M.R.), “Digital signature protection of ospf routing protocol,” inProceedings of the 1996 Network and Distributed System Security Symposium, (San Diego), Isoc, 1996.
Heffernan (A.), “Protection of BGP sessions via the TCP md5 signature option,” draft-ietf-idr-bgp-tcp-md5-00.txt (Work in Progress), Mar 1998.
Bates (T.), Bush (R.), Li (T.), Rekhter (Y.), “DNS-based nlri origin AS verification in bgp,” draft-bates-bgp4-nlri-orig-verif-00.txt (Work in Progress), Feb 1998.
Murphy (S.), “bgp security analysis,” draft-murphy-bgp-secr-01.txt (Work in Progress), Aug 1998.
Przygienda (T.), “bgp-4 md5 authentication,” draft-przygienda-bgp-md5-00.txt (Work in Progress), Nov 1997.
Moy (J.), ospf:Anatomy of an Internet Routing Protocol, Addi-son-Wesley, 1998.
Villamizar (C), Alaettinoglu (C), Meyer (D.), Murphy (S.), and Orange (C), “Routing policy system security,” draft-IETF-rps-auth-01.txt (Work in Progress), May 1998.
HAuser (R.), Przygienda (T.), Tsudik (G.), “Reducing the cost of security in link-state routing,”in Proceedings of the 1997 Network and Distributed System Security Symposium, (San Diego), ISOC, 1997.
Smith (B.R.), Murthy (S.), Garcia-Luna-Aceves (J.J.), “Securing distance vector routing protocols,”in Proceedings of the 1997 Network and Distributed System Security Symposium, (San Diego), ISOC, 1997.
Sirois (K.E.), Kent (ST.), “Securing the nimrod routing architecture,”in Proceedings of the 1997 Netmork and Distributed System Security Symposium, (San Diego), ISOC, 1997.
Ballardie (T.), Crowcroft (J.), “Multicast-specific security threats and counter-measures,”in Proceedings of the Symposium on Network and Distributed Systems Security - NDSS’95, (San Diego), ISOC, 1995.
Wei (L.), “Authenticating pim version 2 messages,” Nov 1998. draft-IETF-pim-v2-auth-00.txt (Work in Progress).
Hardjono (T.), Cain (B.), “Simple key management protocol for pim, 7 draft-ietf-pim-simplelkmp-00.txt (Work in Progress), Mar 1999.
Shields (C), Garcia-Luna-Aceves (J.), “khip — a scalable protocol for secure multicast routing,”in Proceedings of ACM SIGCOMM’99. acm, 1999. (To appear).
Hardjono (T.), Whetten (B.), “Security requirements for RMTP-II,” draft-ielf-rmtp-ii-sec-00.txt (Unpublished Work in Progress), May 1999.
Whetten (B.), Basavaiah (M.), Paul (S.), Montgomery (T.), “rmtp-II specification,” draft-whetten-RMTP-ii-00.txt (Work in Progress), Apr 1998.
Smith (J.), Weingarten (F.), “Research challenges for the next generation internet,”Report from the Workshop on Research Directions for NGI, May 1997.
Steer (D.), Strawczynski (L.), Diffie (W.), Wiener (M.), “A secure audio teleconference system,”in Advances in Cryptology,CRYPTO’88, August 1990.
Fiat (A.), Naor (M.), “Broadcast encryption,”in Advances in Cryptology - CRYPTO’9S, August 1993.
Burmester (M.), Desmedt (Y.), “A secure and efficient conference key distribution system,”in Advances in Cryptology-EUROCRYPT’94, May 1994.
Just (M.), Vaudenay (S.), “Authenticated multi-party key agreement,”in Advances in Cryptology, EUROCRYPT96, May 1996.
Steiner (M.), Tsudik (G.), Waidner (M.), “Diffie-Hellman key distribution extended to groups,”in ACM Symposium on Computer and Communication Security, March 1996.
Steiner (M.), Tsudik (G.), Waidner (M.), “Cliques: A new approach to group key agreement,”in IEEE Conference on Distributed Computing Systems, May 1998.
Ateniese (G.), Steiner (M.), and Tsudik (G.), “Authenticated group key agreement and friends,”in ACM Symposium on Computer and Communication Security, November 1998.
Poovendran (R.), Corson (S.), Baras (J.), “A shared key generation procedure using fractional keys,”in IEEE Milcom 98, October 1998.
Diffie (W.), Hellman (E.), “New directions in cryptography,”IEEE Tansactions on Information Theory, IT-22, n° 6, pp. 644–54, 1976.
Berket (K.), Moser (L.), Melliar-Smith (P.), “The intergroup protocols: Scalable group communication for the internet,”in Proceedings of the 3rd Global Internet Mini-Conference, November 1998.
Krawczyk (H.), Bellare (M.), Canetti (R.), “HMAC: Key hashing for message authentication,”RFC 2104, ietf, February 1997.
Camenisch (J.), Stadler (M.), “Efficient group signature schemes for large groups,” inAdvances in Cryptology, CRYPTO’97, 1997.
Camenisch (J.), “Efficient and generalized group signatures,”in Advances in Cryptology, EUROCRYPT’97, 1997.
Ateniese (G.), Tsudik (G.), “Group signatures à la carte,”in ACM/S1AMSymposium on Discrete Algorithms (SODA ’99), Jannary 1999.
Ateniese (G.), Tsudik (G.), “Some open problems and new directions in group signatures,”in Financial Cryptography ’99, February 1999.