Security in distributed, grid, mobile, and pervasive computing / / Yang Xiao.

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Compu...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Boca Raton, FL : : Auerbach Publishers,, [2007]
©2007
Year of Publication:2007
Language:English
Physical Description:1 online resource (436 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546835504498
ctrlnum (CKB)1000000000344813
(EBL)308468
(OCoLC)476089258
(SSID)ssj0000243250
(PQKBManifestationID)11923097
(PQKBTitleCode)TC0000243250
(PQKBWorkID)10321186
(PQKB)11325343
(MiAaPQ)EBC308468
(OCoLC)173376759
(OCoLC)815543431
(OCoLC-P)815543431
(FlBoTFG)9780429119347
(NjHacI)991000000000344813
(oapen)https://directory.doabooks.org/handle/20.500.12854/27558
(MiAaPQ)EBC7244847
(Au-PeEL)EBL7244847
(OCoLC)1202559532
(EXLCZ)991000000000344813
collection bib_alma
record_format marc
spelling Xiao, Yang, author.
Security in distributed, grid, mobile, and pervasive computing / Yang Xiao.
Boca Raton, FL : Auerbach Publishers, [2007]
©2007
1 online resource (436 p.)
text txt
computer c
online resource cr
Description based upon print version of record.
Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks
Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment
Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover
English
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.
OCLC-licensed vendor bibliographic record.
Description based on print version record.
Includes bibliographical references and index.
Computer security.
Mobile computing Security measures.
0-8493-7921-0
Xiao, Yang.
language English
format eBook
author Xiao, Yang,
spellingShingle Xiao, Yang,
Security in distributed, grid, mobile, and pervasive computing /
Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks
Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment
Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover
author_facet Xiao, Yang,
author_variant y x yx
author_role VerfasserIn
author_sort Xiao, Yang,
title Security in distributed, grid, mobile, and pervasive computing /
title_full Security in distributed, grid, mobile, and pervasive computing / Yang Xiao.
title_fullStr Security in distributed, grid, mobile, and pervasive computing / Yang Xiao.
title_full_unstemmed Security in distributed, grid, mobile, and pervasive computing / Yang Xiao.
title_auth Security in distributed, grid, mobile, and pervasive computing /
title_new Security in distributed, grid, mobile, and pervasive computing /
title_sort security in distributed, grid, mobile, and pervasive computing /
publisher Auerbach Publishers,
publishDate 2007
physical 1 online resource (436 p.)
contents Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks
Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment
Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover
isbn 1-000-21893-7
0-429-11934-8
1-281-12778-7
9786611127787
0-8493-7925-3
0-8493-7921-0
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 X53 42007
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 476089258
173376759
815543431
1202559532
work_keys_str_mv AT xiaoyang securityindistributedgridmobileandpervasivecomputing
status_str n
ids_txt_mv (CKB)1000000000344813
(EBL)308468
(OCoLC)476089258
(SSID)ssj0000243250
(PQKBManifestationID)11923097
(PQKBTitleCode)TC0000243250
(PQKBWorkID)10321186
(PQKB)11325343
(MiAaPQ)EBC308468
(OCoLC)173376759
(OCoLC)815543431
(OCoLC-P)815543431
(FlBoTFG)9780429119347
(NjHacI)991000000000344813
(oapen)https://directory.doabooks.org/handle/20.500.12854/27558
(MiAaPQ)EBC7244847
(Au-PeEL)EBL7244847
(OCoLC)1202559532
(EXLCZ)991000000000344813
carrierType_str_mv cr
is_hierarchy_title Security in distributed, grid, mobile, and pervasive computing /
_version_ 1804704170158063616
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01429nam a22003373i 4500</leader><controlfield tag="001">993546835504498</controlfield><controlfield tag="005">20231110172225.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr un|---uuuuu</controlfield><controlfield tag="008">231110s2007 flua ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-000-21893-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-11934-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-281-12778-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611127787</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8493-7925-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9780849379253 </subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)1000000000344813</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)308468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476089258</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000243250</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11923097</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000243250</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10321186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11325343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC308468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)173376759</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815543431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)815543431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(FlBoTFG)9780429119347</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)991000000000344813</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/27558</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7244847</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7244847</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1202559532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)991000000000344813</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">X53 2007</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UACD</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">005.8</subfield></datafield><datafield tag="082" ind1=" " ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Xiao, Yang,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in distributed, grid, mobile, and pervasive computing /</subfield><subfield code="c">Yang Xiao.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL :</subfield><subfield code="b">Auerbach Publishers,</subfield><subfield code="c">[2007]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (436 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8493-7921-0</subfield></datafield><datafield tag="720" ind1=" " ind2=" "><subfield code="a">Xiao, Yang.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-07-16 02:12:07 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 01:57:29 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338363210004498&amp;Force_direct=true</subfield><subfield code="Z">5338363210004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338363210004498</subfield></datafield></record></collection>