S-SSM : A Secure SSM Architecture
draft-irtf-gsec-sssm-00
Document | Type |
Expired Internet-Draft
(gsec RG)
Expired & archived
|
|
---|---|---|---|
Authors | Ghassan Chaddoud , Andre Schaff | ||
Last updated | 2002-02-21 | ||
RFC stream | Internet Research Task Force (IRTF) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | IRTF state | (None) | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The SSM model is appeared in order to overcome the problems of deployment of IP multicast. However, a real commercial deployment of SSM have to offer some security services. Our work proposes an architecture, called S-SSM, for securing the SSM model. S-SSM defines two mechanisms for access control and content protection. The first one is carried out through subscriber authentication and access permission. As for the second, it is realized through the management of a unique key, called the channel key, k_ch, shared among the sender and subscribers.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)