TY - GEN
T1 - Fine-grained and scalable approaches for message integrity
AU - Park, Joon S.
AU - Devarajan, Ganesh
PY - 2007
Y1 - 2007
N2 - When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to be maintained in an effective manner. There is an urgent need for new mechanisms in a trusted content-sharing environment to support multiple signers for the same message, which can be dynamically updated with autonomous protection and maintenance mechanisms. In our previous work we identified and compared three different binding mechanisms including monolithic, autonomous, and chained binding mechanisms, using digital signatures. The original work was designed and implemented for digital certificates. In this paper we apply those schemes with extension to the organization-to-organization messaging services that require effective integrity verification and tracking mechanisms at the user-level in the receiving organization in a scalable manner with fine granularity. We implement our ideas in the Java Remote Method Invocation (RMI) platform and discuss the trade-offs of the signature schemes based on our experimental results.
AB - When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to be maintained in an effective manner. There is an urgent need for new mechanisms in a trusted content-sharing environment to support multiple signers for the same message, which can be dynamically updated with autonomous protection and maintenance mechanisms. In our previous work we identified and compared three different binding mechanisms including monolithic, autonomous, and chained binding mechanisms, using digital signatures. The original work was designed and implemented for digital certificates. In this paper we apply those schemes with extension to the organization-to-organization messaging services that require effective integrity verification and tracking mechanisms at the user-level in the receiving organization in a scalable manner with fine granularity. We implement our ideas in the Java Remote Method Invocation (RMI) platform and discuss the trade-offs of the signature schemes based on our experimental results.
UR - http://www.scopus.com/inward/record.url?scp=39749129241&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=39749129241&partnerID=8YFLogxK
U2 - 10.1109/HICSS.2007.229
DO - 10.1109/HICSS.2007.229
M3 - Conference contribution
AN - SCOPUS:39749129241
SN - 0769527558
SN - 9780769527550
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
BT - Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07
T2 - 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07
Y2 - 3 January 2007 through 6 January 2007
ER -