Cargando…

Trust and Security in Collaborative Computing.

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Zou, Xukai
Otros Autores: Dai, Yuan-Shun, Pan, Yi
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Singapore : World Scientific Publishing Company, 2008.
Colección:Computer and network security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn879023523
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 140501s2008 si o 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d EBLCP  |d OCLCO  |d OCLCQ  |d I9W  |d DEBSZ  |d OCLCQ  |d ZCU  |d MERUC  |d U3W  |d OCLCO  |d OCLCA  |d OCLCF  |d ICG  |d INT  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 840312156  |a 1086426834 
020 |a 9789812790880 
020 |a 9812790888 
029 1 |a AU@  |b 000058360779 
029 1 |a DEBBG  |b BV044178778 
029 1 |a DEBSZ  |b 431676801 
035 |a (OCoLC)879023523  |z (OCoLC)840312156  |z (OCoLC)1086426834 
050 4 |a QA76.9.A25 Z69 2008 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Zou, Xukai. 
245 1 0 |a Trust and Security in Collaborative Computing. 
260 |a Singapore :  |b World Scientific Publishing Company,  |c 2008. 
300 |a 1 online resource (248 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer and Network Security 
588 0 |a Print version record. 
520 |a Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. Th. 
505 0 |a 1. Introduction. 1.1. Overview of trusted collaborative computing. 1.2. Basic concepts in terms of security. 1.3. Basic concepts in terms of reliability. 1.4. Abbreviations and notations. 1.5. Outline -- 2. Secure Group Communication (SGC). 2.1. Overview of Secure Group Communication (SGC). 2.2. Typical group key management schemes for SGC. 2.3. Enhanced group key management for SGC. 2.4. Conclusion -- 3. Cryptography based access control. 3.1. Overview of access control in collaborative computing. 3.2. An efficient Differential Access Control (DIF-AC) scheme. 3.3. Cryptographic Hierarchical Access Control (CHAC) schemes. 3.4. A uniform CHAC scheme based on access polynomials. 3.5. Conclusion -- 4. Intrusion detection and defense. 4.1. Overview of intrusion detection and defense. 4.2. Intruding attacks. 4.3. Intrusion detection models. 4.4. Intrusion response. 4.5. DoS/ DDoS attacks. 4.6. Typical DoS/DDoS defense mechanisms. 4.7. Defending against DoS/DDoS attacks-traceback. 4.8. Exemplary DoS/DDoS defense research projects and systems. 4.9. Secure Overlay Service (SOS). 4.10. Conclusion -- 5. Reliability in grid computing. 5.1. Overview of reliability in grid computing. 5.2. Grid service reliability and performance. 5.3. Star topology grid architecture. 5.4. Tree topology grid architecture. 5.5. Conclusion -- 6. Security in grid computing. 6.1. Overview of security in grid computing. 6.2. Existing research on grid computing security. 6.3. Secure grid communication and controlled resource sharing in grid computing. 6.4. Dual-Level Key Management (DLKM). 6.5. Secure grid computing by DLKM. 6.6. Conclusion -- 7. Trusted and seamless medical information systems. 7.1. Overview of trusted and seamless medical information systems. 7.2. Health information technology and medical information system. 7.3. Architecture of the proposed secure MIS. 7.4. Dependable MIS based on grid computing technology. 7.5. Conclusion. 
504 |a Includes bibliographical references (pages 207-223) and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Groupware (Computer software) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels de groupe. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Groupware (Computer software)  |2 fast 
700 1 |a Dai, Yuan-Shun. 
700 1 |a Pan, Yi. 
758 |i has work:  |a Trust and security in collaborative computing (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFYqccBJRrGm8RkyGY36Dq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9789812703682 
830 0 |a Computer and network security. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1679354  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1679354 
994 |a 92  |b IZTAP