Trust and Security in Collaborative Computing.
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions o...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Singapore :
World Scientific Publishing Company,
2008.
|
Colección: | Computer and network security.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- 1. Introduction. 1.1. Overview of trusted collaborative computing. 1.2. Basic concepts in terms of security. 1.3. Basic concepts in terms of reliability. 1.4. Abbreviations and notations. 1.5. Outline
- 2. Secure Group Communication (SGC). 2.1. Overview of Secure Group Communication (SGC). 2.2. Typical group key management schemes for SGC. 2.3. Enhanced group key management for SGC. 2.4. Conclusion
- 3. Cryptography based access control. 3.1. Overview of access control in collaborative computing. 3.2. An efficient Differential Access Control (DIF-AC) scheme. 3.3. Cryptographic Hierarchical Access Control (CHAC) schemes. 3.4. A uniform CHAC scheme based on access polynomials. 3.5. Conclusion
- 4. Intrusion detection and defense. 4.1. Overview of intrusion detection and defense. 4.2. Intruding attacks. 4.3. Intrusion detection models. 4.4. Intrusion response. 4.5. DoS/ DDoS attacks. 4.6. Typical DoS/DDoS defense mechanisms. 4.7. Defending against DoS/DDoS attacks-traceback. 4.8. Exemplary DoS/DDoS defense research projects and systems. 4.9. Secure Overlay Service (SOS). 4.10. Conclusion
- 5. Reliability in grid computing. 5.1. Overview of reliability in grid computing. 5.2. Grid service reliability and performance. 5.3. Star topology grid architecture. 5.4. Tree topology grid architecture. 5.5. Conclusion
- 6. Security in grid computing. 6.1. Overview of security in grid computing. 6.2. Existing research on grid computing security. 6.3. Secure grid communication and controlled resource sharing in grid computing. 6.4. Dual-Level Key Management (DLKM). 6.5. Secure grid computing by DLKM. 6.6. Conclusion
- 7. Trusted and seamless medical information systems. 7.1. Overview of trusted and seamless medical information systems. 7.2. Health information technology and medical information system. 7.3. Architecture of the proposed secure MIS. 7.4. Dependable MIS based on grid computing technology. 7.5. Conclusion.