Security in Distributed, Grid, Mobile, and Pervasive Computing

This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange a...

Full description

Saved in:
Bibliographic Details
Main Author: Xiao, Yang (auth)
Format: Electronic Book Chapter
Language:English
Published: Taylor & Francis 2007
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_41646
005 20200921
003 oapen
006 m o d
007 cr|mn|---annan
008 20200921s2007 xx |||||o ||| 0|eng d
020 |a 9780849379253 
040 |a oapen  |c oapen 
024 7 |a 10.1201/9780849379253  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UB  |2 bicssc 
072 7 |a UT  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a THR  |2 bicssc 
072 7 |a TJKT1  |2 bicssc 
100 1 |a Xiao, Yang  |4 auth 
245 1 0 |a Security in Distributed, Grid, Mobile, and Pervasive Computing 
260 |b Taylor & Francis  |c 2007 
300 |a 1 electronic resource (440 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. 
540 |a Creative Commons  |f by-nc-nd/4.0  |2 cc  |4 http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a English 
650 7 |a Information technology: general issues  |2 bicssc 
650 7 |a Computer networking & communications  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
650 7 |a Electrical engineering  |2 bicssc 
650 7 |a Mobile phone technology  |2 bicssc 
653 |a IT Security 
653 |a Networks 
653 |a Digital and Wireless Communication 
653 |a ENG 
653 |a InfoSECURITY 
653 |a ElectricalEngineering 
653 |a SCI-TECH 
653 |a ITECH 
653 |a INFORMATIONSCIENCE 
653 |a STM 
653 |a access 
653 |a based 
653 |a control 
653 |a hoc 
653 |a networks 
653 |a protocol 
653 |a role 
653 |a routing 
653 |a sensor 
653 |a wireless 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/14441364-f9c6-4ded-9b77-ccfe31a9932b/9780849379253.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/41646  |7 0  |z OAPEN Library: description of the publication