The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is assuming increasing importance in emerging networks. To ensure application security, the routing protocols are assumed to be trusted. Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol. Valid construction of the routes requires that the exchanged information be received from a legitimate neighbor, and that it not...
Multicasting has not been widely adopted until now, due to lack of receiver or end user (EU) access control. We have developed the Internet group management protocol with access control (IGMP-AC), an extended version of IGMPv3, which provides EU access control by incorporating the AAA framework into the existing multicast service model. Furthermore, IGMP-AC works as an extensible authentication protocol...
Delivery of streaming media to individual users is very successful, and the e-commerce models for this are well established, based on a one-to-one relationship between the purchaser and the content provider. However, as the demand for a particular product goes up, it is possible to exceed the processing limit of the content provider. The use of multicast distribution technology can lower the processing...
Multicasting has not been widely adopted until now, due to lack of access control over the group members. The authentication, authorization and accounting (AAA) protocols are being used successfully, in unicast communication scenarios, to control access to network resources. AAA protocols can be used for multicast applications in a similar way. However, without an effective sender access control,...
Web database security is a very important issue in e-commerce. This paper presents a new Web database security model. It utilizes the host identity protocol (HIP), which is being defined by the IETF, and a proposed user identity exchange, to achieve authentication of host identity and user identity, and combines it with the database system itself and encryption to guarantee Web database security and...
Multicast is an efficient way to distribute data to multiple receivers simultaneously. However, security, scalability, and group management issues still prevent the wide deployment of multicast data transmission. In this paper, we will present a Scalable Secure Multicast System. To provide scalability, the system has a hierarchical structure. The system ensures Perfect Forward Secrecy and Perfect...
Since the correspondent registration messages in MIPv6 go through all the nodes that are responsible for QoS configuration after handover, we propose to extend the binding update (BU) messages of standard MIPV6 to carry scheme-dependent QoS data. Correspondent registration is performed by these new agent update (AU) messages. The AU messages are intercepted by QoS Agents, which are located in the...
IP multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized end users or paying customers. A scalable, distributed and secure architecture is needed where authorized end users can be authenticated before delivering any data or content. In (unsecure) multicast, an end user or host informs...
All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non-repudiation. E-commerce protocols such as SSL, TLS, and SET offer security for e-transactions, but they are specific to the unicast (point-to-point) environment. They cannot be directly extended to provide security for multicast (point-to-multipoint) sessions. Multicast...
One reason that multicast communication is not in widespread use is its anonymous host model: a host may join and leave a group at any time from anywhere. Lack of information about service users and access control in this model makes it vulnerable to different types of attacks and also creates problems for a service provider to generate enough revenue. An architecture is proposed in this paper to...
As general-purpose computing systems become larger and more complex, it has become uneconomical to restrict their use to a single user or program. This has introduced the necessity of finding ways to safely share them.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.