{"id":"https://openalex.org/W2007297774","doi":"https://doi.org/10.1145/1582379.1582402","title":"Securing hierarchical multicast communications using roles","display_name":"Securing hierarchical multicast communications using roles","publication_year":2009,"publication_date":"2009-06-21","ids":{"openalex":"https://openalex.org/W2007297774","doi":"https://doi.org/10.1145/1582379.1582402","mag":"2007297774"},"language":"en","primary_location":{"id":"doi:10.1145/1582379.1582402","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1582379.1582402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111529459","display_name":"Ezedin E. Barka","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Ezedin E. Barka","raw_affiliation_strings":["United Arab Emirates University, AL Ain, United Arab Emirates","United Arab Emirates University , Al Ain , United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"United Arab Emirates University, AL Ain, United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"United Arab Emirates University , Al Ain , United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111448847","display_name":"Emad Eldin Mohamed","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Emad Eldin Mohamed","raw_affiliation_strings":["United Arab Emirates University, AL Ain, United Arab Emirates","United Arab Emirates University , Al Ain , United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"United Arab Emirates University, AL Ain, United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"United Arab Emirates University , Al Ain , United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111529459"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.9753,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.84849844,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"101","last_page":"105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.9247279167175293},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7902836799621582},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.7684789299964905},{"id":"https://openalex.org/keywords/pragmatic-general-multicast","display_name":"Pragmatic General Multicast","score":0.7678048014640808},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7298963665962219},{"id":"https://openalex.org/keywords/xcast","display_name":"Xcast","score":0.6961080431938171},{"id":"https://openalex.org/keywords/ip-multicast","display_name":"IP multicast","score":0.6866803765296936},{"id":"https://openalex.org/keywords/protocol-independent-multicast","display_name":"Protocol Independent Multicast","score":0.6717734336853027},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.5429167747497559},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.5244465470314026},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5181071162223816},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.49604663252830505},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.47513869404792786},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4598688781261444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3254355490207672},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.07356545329093933}],"concepts":[{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.9247279167175293},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7902836799621582},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.7684789299964905},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.7678048014640808},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7298963665962219},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.6961080431938171},{"id":"https://openalex.org/C150329594","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"IP multicast","level":3,"score":0.6866803765296936},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.6717734336853027},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.5429167747497559},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.5244465470314026},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5181071162223816},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49604663252830505},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.47513869404792786},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4598688781261444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3254355490207672},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.07356545329093933}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1582379.1582402","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1582379.1582402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5299999713897705,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W113924183","https://openalex.org/W1513710402","https://openalex.org/W1542556897","https://openalex.org/W1997199359","https://openalex.org/W2031887679","https://openalex.org/W2037238879","https://openalex.org/W2069972302","https://openalex.org/W2083408498","https://openalex.org/W2099326030","https://openalex.org/W2107566868","https://openalex.org/W2121243646","https://openalex.org/W2123982806","https://openalex.org/W2127275895","https://openalex.org/W2127280340","https://openalex.org/W2128094178","https://openalex.org/W2151211821","https://openalex.org/W2166602595","https://openalex.org/W4251969990"],"related_works":["https://openalex.org/W2393131931","https://openalex.org/W1850815052","https://openalex.org/W3142539034","https://openalex.org/W2136818972","https://openalex.org/W2157815988","https://openalex.org/W2167889693","https://openalex.org/W2382754013","https://openalex.org/W2016444326","https://openalex.org/W2114210083","https://openalex.org/W2659348321"],"abstract_inverted_index":{"In":[0,53],"multicast":[1,40,59,70,83],"communications,":[2],"where":[3],"service":[4],"providers":[5],"distribute":[6],"services":[7],"such":[8,49,91],"as":[9,50,127,129],"streaming":[10],"multimedia,":[11],"distributed":[12],"databases,":[13],"and":[14,29,62,85,117],"etc.,":[15],"an":[16],"important":[17],"issue":[18,34],"is":[19,95,109,113],"to":[20,24,67,123,130],"control":[21,79,102],"the":[22,26,30,39,51,58,98,121,124,131],"access":[23,78,101,122],"both":[25],"transmitted":[27,125],"data":[28,126,138],"network":[31],"resources.":[32],"This":[33],"becomes":[35],"more":[36],"complicated":[37],"when":[38],"communication":[41],"takes":[42],"place":[43],"in":[44,81,119,136],"a":[45,64,87],"hierarchical":[46,69,82],"organizational":[47],"structure,":[48],"military.":[52],"this":[54],"paper,":[55],"we":[56,73],"analyze":[57],"security":[60],"issues":[61],"propose":[63,86],"new":[65],"approach":[66,94,108],"securing":[68],"communications.":[71],"Specifically,":[72],"specify":[74],"requirements":[75],"for":[76,89],"developing":[77],"policies":[80],"communications":[84],"model":[88],"enforcing":[90],"policies.":[92],"Our":[93],"based":[96],"on":[97],"well-known":[99],"role-based":[100],"model.":[103],"We":[104],"show":[105],"that":[106],"our":[107],"simple,":[110],"but":[111],"yet":[112],"very":[114],"flexible,":[115],"scalable,":[116],"effective":[118],"controlling":[120],"well":[128],"shared":[132],"secret":[133],"key,":[134],"used":[135],"providing":[137],"confidentiality.":[139]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
