Standard ipmulticast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on th...
详细信息
ISBN:
(纸本)9781424406661
Standard ipmulticast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on the use of an extended version of the Host Identity Protocol. The applicability of the model is demonstrated for peer-to-peer multicasting and for non-shared media access networks. A formal validation of a two-layer peer-to-peer network based on this architecture has been completed.
Standard ipmulticast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on th...
详细信息
Standard ipmulticast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on the use of an extended version of the Host Identity Protocol. The applicability of the model is demonstrated for peer-to-peer multicasting and for non-shared media access networks. A formal validation of a two-layer peer-to-peer network based on this architecture has been completed.
暂无评论