|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn879023523 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
140501s2008 si o 000 0 eng d |
040 |
|
|
|a MHW
|b eng
|e pn
|c MHW
|d EBLCP
|d OCLCO
|d OCLCQ
|d I9W
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d U3W
|d OCLCO
|d OCLCA
|d OCLCF
|d ICG
|d INT
|d AU@
|d OCLCQ
|d DKC
|d OCLCQ
|d LEAUB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 840312156
|a 1086426834
|
020 |
|
|
|a 9789812790880
|
020 |
|
|
|a 9812790888
|
029 |
1 |
|
|a AU@
|b 000058360779
|
029 |
1 |
|
|a DEBBG
|b BV044178778
|
029 |
1 |
|
|a DEBSZ
|b 431676801
|
035 |
|
|
|a (OCoLC)879023523
|z (OCoLC)840312156
|z (OCoLC)1086426834
|
050 |
|
4 |
|a QA76.9.A25 Z69 2008
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zou, Xukai.
|
245 |
1 |
0 |
|a Trust and Security in Collaborative Computing.
|
260 |
|
|
|a Singapore :
|b World Scientific Publishing Company,
|c 2008.
|
300 |
|
|
|a 1 online resource (248 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Computer and Network Security
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. Th.
|
505 |
0 |
|
|a 1. Introduction. 1.1. Overview of trusted collaborative computing. 1.2. Basic concepts in terms of security. 1.3. Basic concepts in terms of reliability. 1.4. Abbreviations and notations. 1.5. Outline -- 2. Secure Group Communication (SGC). 2.1. Overview of Secure Group Communication (SGC). 2.2. Typical group key management schemes for SGC. 2.3. Enhanced group key management for SGC. 2.4. Conclusion -- 3. Cryptography based access control. 3.1. Overview of access control in collaborative computing. 3.2. An efficient Differential Access Control (DIF-AC) scheme. 3.3. Cryptographic Hierarchical Access Control (CHAC) schemes. 3.4. A uniform CHAC scheme based on access polynomials. 3.5. Conclusion -- 4. Intrusion detection and defense. 4.1. Overview of intrusion detection and defense. 4.2. Intruding attacks. 4.3. Intrusion detection models. 4.4. Intrusion response. 4.5. DoS/ DDoS attacks. 4.6. Typical DoS/DDoS defense mechanisms. 4.7. Defending against DoS/DDoS attacks-traceback. 4.8. Exemplary DoS/DDoS defense research projects and systems. 4.9. Secure Overlay Service (SOS). 4.10. Conclusion -- 5. Reliability in grid computing. 5.1. Overview of reliability in grid computing. 5.2. Grid service reliability and performance. 5.3. Star topology grid architecture. 5.4. Tree topology grid architecture. 5.5. Conclusion -- 6. Security in grid computing. 6.1. Overview of security in grid computing. 6.2. Existing research on grid computing security. 6.3. Secure grid communication and controlled resource sharing in grid computing. 6.4. Dual-Level Key Management (DLKM). 6.5. Secure grid computing by DLKM. 6.6. Conclusion -- 7. Trusted and seamless medical information systems. 7.1. Overview of trusted and seamless medical information systems. 7.2. Health information technology and medical information system. 7.3. Architecture of the proposed secure MIS. 7.4. Dependable MIS based on grid computing technology. 7.5. Conclusion.
|
504 |
|
|
|a Includes bibliographical references (pages 207-223) and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Groupware (Computer software)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Logiciels de groupe.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Groupware (Computer software)
|2 fast
|
700 |
1 |
|
|a Dai, Yuan-Shun.
|
700 |
1 |
|
|a Pan, Yi.
|
758 |
|
|
|i has work:
|a Trust and security in collaborative computing (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFYqccBJRrGm8RkyGY36Dq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 9789812703682
|
830 |
|
0 |
|a Computer and network security.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1679354
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1679354
|
994 |
|
|
|a 92
|b IZTAP
|