TY - GEN
T1 - Securing hierarchical multicast communications using roles
AU - Barka, Ezedin E.
AU - Mohamed, Emad Eldin
PY - 2009
Y1 - 2009
N2 - In multicast communications, where service providers distribute services such as streaming multimedia, distributed databases, and etc., an important issue is to control the access to both the transmitted data and the network resources. This issue becomes more complicated when the multicast communication takes place in a hierarchical organizational structure, such as the military. In this paper, we analyze the multicast security issues and propose a new approach to securing hierarchical multicast communications. Specifically, we specify requirements for developing access control policies in hierarchical multicast communications and propose a model for enforcing such policies. Our approach is based on the well-known role-based access control model. We show that our approach is simple, but yet is very flexible, scalable, and effective in controlling the access to the transmitted data as well as to the shared secret key, used in providing data confidentiality.
AB - In multicast communications, where service providers distribute services such as streaming multimedia, distributed databases, and etc., an important issue is to control the access to both the transmitted data and the network resources. This issue becomes more complicated when the multicast communication takes place in a hierarchical organizational structure, such as the military. In this paper, we analyze the multicast security issues and propose a new approach to securing hierarchical multicast communications. Specifically, we specify requirements for developing access control policies in hierarchical multicast communications and propose a model for enforcing such policies. Our approach is based on the well-known role-based access control model. We show that our approach is simple, but yet is very flexible, scalable, and effective in controlling the access to the transmitted data as well as to the shared secret key, used in providing data confidentiality.
KW - Access control
KW - Multicast communications
KW - Multicast security
KW - RBAC
UR - https://www.scopus.com/pages/publications/70450263481
UR - https://www.scopus.com/pages/publications/70450263481#tab=citedBy
U2 - 10.1145/1582379.1582402
DO - 10.1145/1582379.1582402
M3 - Conference contribution
AN - SCOPUS:70450263481
SN - 9781605585697
T3 - Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing, Connecting the World Wirelessly, IWCMC 2009
SP - 101
EP - 105
BT - Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
PB - Association for Computing Machinery (ACM)
T2 - 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Y2 - 21 June 2009 through 24 June 2009
ER -