Based on work conducted by the internet engineering task force (IETF) and internet research task force (IRTF), this book addresses three areas of security in IP multicast data origin authentication, group key distribution, and group policy. The authors suggest the group security association (GSA) as the multicast counterpart to the unicast SA, group key distribution protocols, architectures for efficient group key management, scalable rekeying algorithms, and security models for tree-based positive acknowledgment (TRACK) and negative-oriented reliable multicast (NORM) families of RM protocols. Annotation (c) Book News, Inc., Portland, OR (booknews.com)