Security in Distributed, Grid, Mobile, and Pervasive Computing

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing f...

पूर्ण विवरण

में बचाया:
ग्रंथसूची विवरण
मुख्य लेखक: Xiao, Yang (auth)
स्वरूप: इलेक्ट्रोनिक पुस्तक अध्याय
भाषा:अंग्रेज़ी
प्रकाशित: Taylor & Francis 2007
विषय:
ऑनलाइन पहुंच:OAPEN Library: download the publication
OAPEN Library: description of the publication
टैग: टैग जोड़ें
कोई टैग नहीं, इस रिकॉर्ड को टैग करने वाले पहले व्यक्ति बनें!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_40056
005 20200723
003 oapen
006 m o d
007 cr|mn|---annan
008 20200723s2007 xx |||||o ||| 0|eng d
020 |a 9780849379253 
040 |a oapen  |c oapen 
024 7 |a 10.1201/9780849379253  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UB  |2 bicssc 
072 7 |a UT  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a THR  |2 bicssc 
072 7 |a TJK  |2 bicssc 
100 1 |a Xiao, Yang  |4 auth 
245 1 0 |a Security in Distributed, Grid, Mobile, and Pervasive Computing 
260 |b Taylor & Francis  |c 2007 
300 |a 1 electronic resource (437 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
650 7 |a Information technology: general issues  |2 bicssc 
650 7 |a Computer networking & communications  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
650 7 |a Electrical engineering  |2 bicssc 
650 7 |a Communications engineering / telecommunications  |2 bicssc 
653 |a Computing 
653 |a Distributed 
653 |a Grid 
653 |a Mobile 
653 |a Pervasive 
653 |a Security 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/99d445c0-901c-4fb3-849e-60ea70db6a82/9780849379215.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/40056  |7 0  |z OAPEN Library: description of the publication