Security in Distributed, Grid, Mobile, and Pervasive ComputingCRC Press, 2007. gada 17. apr. - 440 lappuses This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. |
Saturs
Part II Security in Mobile Computing | 67 |
Part III Security in Grid Computing | 203 |
Part IV Security in Pervasive Computing | 347 |
Index | 411 |
Citi izdevumi - Skatīt visu
Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao Ierobežota priekšskatīšana - 2007 |
Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao Priekšskatījums nav pieejams - 2007 |
Bieži izmantoti vārdi un frāzes
access control ad hoc networks adversary algorithm anonymity applications approach architecture authentication protocol authorization base station Bluetooth Bluetooth device broker challenges client communication components confidentiality constraints consumer context credentials cryptography data aggregation decrypt defined denial-of-service attacks distributed domain dynamic entities Figure forwarding nodes function Global Grid Forum Globus Toolkit grid computing grid environment grid security grid services group key hash hoc networks identity IEEE implementation infrastructure integrity interoperability intrusion detection issues key agreement key management link key mechanisms middleware mobile monitoring nodes multicast neighboring nodes OGSA packets patterns private key proxy certificate public key random number rekeying request resource role routing protocols scheme secret key security policies security tokens sensor nodes server service requestor session key shared specific standard subgroup Sybil attack task techniques technologies tion trust token verify wireless networks wireless sensor networks WS-Policy WS-SecureConversation WS-Security WS-Trust
Populāri fragmenti
180. lappuse - Dynamic Source Routing in Ad Hoc Wireless Networks,
22. lappuse - Kubiatowicz: Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 22 (2004): 41-53 8.
405. lappuse - D. Estrin, R. Govindan, J. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks.
407. lappuse - J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses.
155. lappuse - C. Intanagonwiwat. D. Estrin, R. Govindan, and J. Heidemann. Impact of network density on data aggregation in wireless sensor networks.
405. lappuse - System Architecture Directions for Networked Sensors", in Architectural Support for Programming Languages and Operating Systems, pages 93104, 2000.
314. lappuse - Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
405. lappuse - In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys).