Trust and Security in Collaborative Computing.

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions o...

Full description

Saved in:
Bibliographic Details
Main Author: Zou, Xukai
Other Authors: Dai, Yuan-Shun, Pan, Yi
Format: eBook
Language:English
Published: Singapore : World Scientific Publishing Company, 2008.
Series:Computer and network security.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000Mu 4500
001 ocn879023523
003 OCoLC
005 20240909213021.0
006 m o d
007 cr |n|---|||||
008 140501s2008 si o 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d EBLCP  |d OCLCO  |d OCLCQ  |d I9W  |d DEBSZ  |d OCLCQ  |d ZCU  |d MERUC  |d U3W  |d OCLCO  |d OCLCA  |d OCLCF  |d ICG  |d INT  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 840312156  |a 1086426834 
020 |a 9789812790880 
020 |a 9812790888 
035 |a (OCoLC)879023523  |z (OCoLC)840312156  |z (OCoLC)1086426834 
050 4 |a QA76.9.A25 Z69 2008 
049 |a HCDD 
100 1 |a Zou, Xukai. 
245 1 0 |a Trust and Security in Collaborative Computing. 
260 |a Singapore :  |b World Scientific Publishing Company,  |c 2008. 
300 |a 1 online resource (248 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer and Network Security 
588 0 |a Print version record. 
520 |a Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. Th. 
505 0 |a 1. Introduction. 1.1. Overview of trusted collaborative computing. 1.2. Basic concepts in terms of security. 1.3. Basic concepts in terms of reliability. 1.4. Abbreviations and notations. 1.5. Outline -- 2. Secure Group Communication (SGC). 2.1. Overview of Secure Group Communication (SGC). 2.2. Typical group key management schemes for SGC. 2.3. Enhanced group key management for SGC. 2.4. Conclusion -- 3. Cryptography based access control. 3.1. Overview of access control in collaborative computing. 3.2. An efficient Differential Access Control (DIF-AC) scheme. 3.3. Cryptographic Hierarchical Access Control (CHAC) schemes. 3.4. A uniform CHAC scheme based on access polynomials. 3.5. Conclusion -- 4. Intrusion detection and defense. 4.1. Overview of intrusion detection and defense. 4.2. Intruding attacks. 4.3. Intrusion detection models. 4.4. Intrusion response. 4.5. DoS/ DDoS attacks. 4.6. Typical DoS/DDoS defense mechanisms. 4.7. Defending against DoS/DDoS attacks-traceback. 4.8. Exemplary DoS/DDoS defense research projects and systems. 4.9. Secure Overlay Service (SOS). 4.10. Conclusion -- 5. Reliability in grid computing. 5.1. Overview of reliability in grid computing. 5.2. Grid service reliability and performance. 5.3. Star topology grid architecture. 5.4. Tree topology grid architecture. 5.5. Conclusion -- 6. Security in grid computing. 6.1. Overview of security in grid computing. 6.2. Existing research on grid computing security. 6.3. Secure grid communication and controlled resource sharing in grid computing. 6.4. Dual-Level Key Management (DLKM). 6.5. Secure grid computing by DLKM. 6.6. Conclusion -- 7. Trusted and seamless medical information systems. 7.1. Overview of trusted and seamless medical information systems. 7.2. Health information technology and medical information system. 7.3. Architecture of the proposed secure MIS. 7.4. Dependable MIS based on grid computing technology. 7.5. Conclusion. 
504 |a Includes bibliographical references (pages 207-223) and index. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Groupware (Computer software) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Groupware (Computer software)  |2 fast 
700 1 |a Dai, Yuan-Shun. 
700 1 |a Pan, Yi. 
758 |i has work:  |a Trust and security in collaborative computing (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFYqccBJRrGm8RkyGY36Dq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9789812703682 
830 0 |a Computer and network security. 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=1679354  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD