Security in Distributed, Grid, Mobile, and Pervasive Computing
dc.contributor.author | Xiao, Yang | |
dc.date.accessioned | 2020-09-21T13:16:32Z | |
dc.date.available | 2020-09-21T13:16:32Z | |
dc.date.issued | 2007 | |
dc.identifier | ONIX_20200921_9780849379253_6 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/41646 | |
dc.description.abstract | This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. | |
dc.language | English | |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security | en_US |
dc.subject.classification | thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineering | en_US |
dc.subject.classification | thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJK Communications engineering / telecommunications::TJKT Telephone technology::TJKT1 Mobile phone technology | en_US |
dc.subject.other | IT Security | |
dc.subject.other | Networks | |
dc.subject.other | Digital and Wireless Communication | |
dc.subject.other | ENG | |
dc.subject.other | InfoSECURITY | |
dc.subject.other | ElectricalEngineering | |
dc.subject.other | SCI-TECH | |
dc.subject.other | ITECH | |
dc.subject.other | INFORMATIONSCIENCE | |
dc.subject.other | STM | |
dc.subject.other | access | |
dc.subject.other | based | |
dc.subject.other | control | |
dc.subject.other | hoc | |
dc.subject.other | networks | |
dc.subject.other | protocol | |
dc.subject.other | role | |
dc.subject.other | routing | |
dc.subject.other | sensor | |
dc.subject.other | wireless | |
dc.title | Security in Distributed, Grid, Mobile, and Pervasive Computing | |
dc.type | book | |
oapen.identifier.doi | 10.1201/9780849379253 | |
oapen.relation.isPublishedBy | 7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb | |
oapen.imprint | Auerbach Publications | |
oapen.pages | 440 |