|
[1] G. Wang, J. Ouyang, H.H. Chen and M. Guo, Efficient group key management for multi-privileged groups, Computer Communications 30 (11–12) (2007), pp. 2497–2509. [2] Y. Sun and K.R. Liu, Hierarchical group access control for secure multicast communications, IEEE/ACM Transactions on Networking 15 (6) (2007), pp. 1514–1526. [3] Qiong Zhang, Yuke Wang, and Jason P. Jue, A key management scheme for hierarchical access control in group communication, International Journal of Network Security 7,(3) (2008), pp. 323-334 [4] Y. Sun and K.J.R. Liu, Scalable hierarchical access control in secure group communications, Proceedings of IEEE INFOCOM 2004 2 (2004), pp. 1296–1306. [5] C.K. Wong, M. Gouda and S.S. Lam, Secure group communications using key graphs, IEEE/ACM Transactions on Networking 8 (1) (2000), pp. 16–30. [6] Q. Zhang and Y. Wang, A centralized key management scheme for hierarchical access control, IEEE GLOBECOM’04 4 (2004), pp. 2067–2071. [7] D.M. Wallner, E.J. Harder and R.C. Agee, Key management for multicast: issues and architectures, IETF Network Working Group, RFC 2627 (1999). [8] Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh: A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Computer Networks 51 (17) (2007): 4727-4743 [9] Xukai Zou, Yuan-Shun Dai_, Xiang Ran, Dual-Level key management for secure grid communication in dynamic and hierarchical groups, Future Generation Computer Systems 23 (2007) 776–786. [10] S.G. Akl, P.D. Taylor, A cryptographic solution to the problem of access control in a hierarchy, ACM Transactions on Computer Systems (TOCS) 1 (3) (1983) 239–248. [11] A. Sherman and D. McGrew, Key establishment in large dynamic groups using one-way function trees, Transactions on Software Engineering 29 (5) (2003), pp. 444–458. [12] Marcel Waldvogel, Germano Caronni, Dan Sun, Nathalie Weiler, Bernhard Plattner, The versakey framework : versatile group key management, Journal on Selected Areas in Communications: Special Issue on Middleware, 17 (9) (1999), pp. 1614-1631. [13] X. Zou, Y. Dai, and E. Bertino, A practical and flexible key management mechanism for trusted collaborative computing, INFOCOM 2008. The 27th Conference on Computer Communications.IEEE, (2008), pp. 538–546.
|