05369nam 22008533 450 991041065350332120241107095523.097866111277879781000218930100021893797804291193470429119348978128112778512811277879780849379253084937925310.1201/9780849379253 (CKB)1000000000344813(EBL)308468(OCoLC)476089258(SSID)ssj0000243250(PQKBManifestationID)11923097(PQKBTitleCode)TC0000243250(PQKBWorkID)10321186(PQKB)11325343(MiAaPQ)EBC308468(OCoLC)173376759(OCoLC)815543431(OCoLC-P)815543431(FlBoTFG)9780429119347(NjHacI)991000000000344813(oapen)https://directory.doabooks.org/handle/20.500.12854/27558(MiAaPQ)EBC7244847(Au-PeEL)EBL7244847(OCoLC)1202559532(ODN)ODN0005562295(ScCtBLL)b0425557-07c1-4dbb-aa1c-44f3e1273d2c(ScCtBLL)c778b964-640d-4f46-a4c9-a66bc54bf623(oapen)doab27558(EXLCZ)99100000000034481320231110d2007 uy 0engurun|---uuuuutxtccrSecurity in distributed, grid, mobile, and pervasive computing /Yang Xiao1 ed.2007Boca Raton, FL :Auerbach Publishers,[2007]©20071 online resource (436 p.)Description based upon print version of record.0-8493-7921-0 Includes bibliographical references and index.Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor NetworksChapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid EnvironmentChapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back coverDespite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.Computer securityMobile computingSecurity measuresComputer security.Mobile computingSecurity measures.005.8005.8COM032000COM043000COM048000bisacshXiao Yang908674MiAaPQMiAaPQMiAaPQBOOK9910410653503321Security in Distributed, Grid, Mobile, and Pervasive Computing2996443UNINA