Learn More
ulticasting is an efficient communication mechanism for group-oriented applications such as video conferencing, interactive group games, and video on demand. IP multicast [1 ] saves bandwidth by sending the source traffic on a multicast tree that spans all the members of the group. In this communication model, groups are identified by a group address, and(More)
—Even though hierarchical group communication is a prominent communication model for a variety of applications , featured by hierarchical communication rules, it has not been sufficiently investigated in the security literature. In this paper, we introduce private hierarchical group communication and we determine its specific confidentiality requirements,(More)
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current users. The bandwidth used for such(More)
The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties whose members are topologically stationary, and they thus do not support both mobile receivers and mobile sources. Unfortunately, the mobility of the multicast source is a challenging(More)
—The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy is defined using the access rights. The different resources are encrypted using different keys. Key management is a critical issue for scalable content access control. In this(More)
The Application Level Multicast (ALM) simplifies the implementation of group communication. However, it still suffer from the same management overhead in case of highly dynamic sessions. In this paper, we propose an efficient key management protocol, called Transition Key Scheme (TKS), for ALM communication. TKS aims to reduce the key management overhead in(More)