Message 1 (App 1 to App 2) Provider Message 2 (App 1 to App 3) Business Application 2 Business Application 3 Business Application 1 Point-to-Multipoint (Multiple Point-to-Point) (a) Provider Message 1 Business Application 1 Message 1 Business Application 2 Message 1 Business Application 3 Network Point-to-Multipoint (Multicast) (b) figure 7. Implementation methodologies for point-to-multipoint exchanges: (a) Methodology 1 and (b) Methodology 2. Transform Message Provider Message 1 Transform Message Business Application 1 Message 3 Message 2 Message 1 Business Application 2 Business Application 3 Business Application 4 ESB figure 8. An enterprise service bus point-to-multipoint. message was initiated by application 1 is potentially lost when messages 2 and 3 are delivered. Digital signature technology is the mechanism to provide end-to-end identity establishment, authentication, and tamper detection. This methodology, when properly applied, protects all contents of the message payload as well as the message header. IEC TC57 Working Group 15 has established two basic technologies for digital signature key management: digital certificate-based signatures for point-to-point communications january/february 2016 and group domain of interpretation (GDOI) for point-to-multipoint communications. The GDOI approach allows multiple applications/providers to authenticate against a key distribution center (KDC) as part of a group interested in exchanging information. The KDC authenticates all the group members and supplies them with the same key material for encryption and signing. The GDOI methodology allows group members to be authenticated but does not authenticate individual applications during the actual message exchange. ieee power & energy magazine 103