The Community for Technology Leaders
RSS Icon
Subscribe
Big Island, HI, USA
Jan. 6, 2003 to Jan. 9, 2003
ISBN: 0-7695-1874-5
pp: 332b
Linda Morales , Texas A&M University-Commerce
I. Hal Sudborough , University of Texas at Dallas
Mohamed Eltoweissy , James Madison University
M. Hossain Heydari , James Madison University
ABSTRACT
There are numerous applications that require secure group communication. Much recent attention has been focused on secure multicasting over the Internet. When such systems are required to manage large groups which undergo frequent fluctuations in group membership, the need for efficient encryption key management becomes critical. This paper presents a combinatorial formulation of the multicast key management problem that is applicable not only to the specific problem of multicast key management, but also to the general problem of managing keys for any type of trusted group communication, regardless of the underlying transmission method between group participants. Specifically, we describe Exclusion Basis Systems, show exactly when they exist, and demonstrate that such systems represent improvements over the current binary tree-based key management systems and other related systems.
INDEX TERMS
null
CITATION
Linda Morales, I. Hal Sudborough, Mohamed Eltoweissy, M. Hossain Heydari, "Combinatorial Optimization of Multicast Key Management", HICSS, 2003, 36th Hawaii International Conference on Systems Sciences, 36th Hawaii International Conference on Systems Sciences 2003, pp. 332b, doi:10.1109/HICSS.2003.1174906
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool