05683nam 22007214a 450 991078227470332120200520144314.01-281-93358-99786611933586981-279-088-8(CKB)1000000000538140(EBL)1679354(OCoLC)879023523(SSID)ssj0000262649(PQKBManifestationID)11236215(PQKBTitleCode)TC0000262649(PQKBWorkID)10271490(PQKB)10546252(MiAaPQ)EBC1679354(WSP)00001925 (Au-PeEL)EBL1679354(CaPaEBR)ebr10255980(CaONFJC)MIL193358(PPN)144440741(EXLCZ)99100000000053814020080424d2008 uy 0engurcn|||||||||txtccrTrust and security in collaborative computing[electronic resource] /Xukai Zou, Yuan-Shun Dai, Yi PanHackensack, NJ World Scientificc20081 online resource (248 p.)Computer and network security ;v. 2Description based upon print version of record.981-270-368-3 Includes bibliographical references and index.Contents; Preface; Acknowledgments; List of Figures; List of Tables; 1. Introduction; 1.1 Overview of Trusted Collaborative Computing; 1.2 Basic Concepts in Terms of Security; 1.3 Basic Concepts in Terms of Reliability; 1.4 Abbreviations and Notations; 1.5 Outline; 2. Secure Group Communication (SGC); 2.1 Overview of Secure Group Communication (SGC); 2.2 Typical Group Key Management Schemes for SGC; 2.2.1 Centralized Group Key Distribution; 2.2.1.1 Key Tree (Logical Key Hierarchy); 2.2.1.2 Other Proposed Schemes; 2.2.2 De-centralized Group Key Management; 2.2.2.1 Iolus2.2.2.2 Other Proposed Schemes 2.2.3 (Distributed) Contributory Group Key Agreement; 2.2.3.1 Tree based Group Di.e-Hellman Key Agreement; 2.2.3.2 Other Proposed Schemes; 2.2.4 Distributed Group Key Distribution; 2.2.4.1 DGKD; 2.3 Enhanced Group Key Management for SGC; 2.3.1 SGC for Wireless and Mobile Ad Hoc Networks; 2.3.1.1 CRTDH; 2.3.1.2 Other Proposed Schemes; 2.3.2 Authenticated Key Exchange (AKE); 2.3.2.1 AUTH-CRTDH; 2.3.2.2 Other Proposed Schemes; 2.3.3 Self-Healing Key Distribution; 2.3.3.1 Self-Healing based on Polynomials and Secret Sharing; 2.3.3.2 Other Proposed Schemes2.3.4 Block-free Group Key Management 2.3.4.1 BF-TGDH; 2.3.5 Secure Dynamic Conferencing; 2.3.5.1 KTDCKM-SDC; 2.3.5.2 Other Proposed Schemes; 2.4 Conclusion; 3. Cryptography based Access Control; 3.1 Overview of Access Control in Collaborative Computing; 3.2 An Efficient Differential Access Control (DIF-AC) Scheme; 3.2.1 System Description and Initialization; 3.2.2 System Dynamics and Maintenance; 3.2.3 Discussion; 3.3 Cryptographic Hierarchical Access Control (CHAC) Schemes; 3.3.1 HACModel; 3.3.2 Directly Dependent Key Schemes; 3.3.3 Indirectly Dependent Key Schemes3.3.4 Polynomial and Interpolation based Schemes 3.3.5 An Efficient CHAC Scheme with Locality; 3.4 A Uniform CHAC Scheme Based on Access Polynomials; 3.4.1 Principle; 3.4.2 Key Computation/Derivation; 3.4.3 Node/Vertex Level Dynamics; 3.4.4 User Level Dynamics; 3.4.5 Security and Performance Analysis; 3.4.5.1 Security Analysis; 3.4.5.2 Performance Analysis; 3.4.6 An Illustrative Example and Experiment Results; 3.4.7 Discussion; 3.4.7.1 Enforcement of Other Access Models; 3.5 Conclusion; 4. Intrusion Detection and Defense; 4.1 Overview of Intrusion Detection and Defense; 4.2 Intruding Attacks4.3 Intrusion Detection Models 4.3.1 Anomaly Modeling; 4.3.2 Misuse Modeling; 4.3.3 Specification Modeling; 4.4 Intrusion Response; 4.5 DoS/DDoS Attacks ; 4.5.1 Typical DoS Attacks; 4.5.1.1 DoS Flooding Attacks; 4.5.1.2 Redirection Attacks; 4.5.1.3 Service Exploits; 4.5.2 Distributed Denial of Service (DDoS) Attacks; 4.5.2.1 DDoS Attack Steps; 4.5.2.2 DDoS Tools; 4.6 Typical DoS/DDoS Defense Mechanisms; 4.6.1 Single-node Defending Method; 4.6.2 Multiple-node Defending Methods; 4.6.2.1 Path Identification; 4.6.3 Honeypot; 4.7 Defending against DoS/DDoS Attacks-Traceback; 4.7.1 ICMP Traceback.4.7.2 (Probabilistic) IP Packet MarkingComputer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing.Computer and network security ;v. 2.Computer securityGroupware (Computer software)Computer networksSecurity measuresComputer security.Groupware (Computer software)Computer networksSecurity measures.005.8Zou Xukai1963-1495496Dai Yuan-Shun1495497Pan Yi1960-895857MiAaPQMiAaPQMiAaPQBOOK9910782274703321Trust and security in collaborative computing3719583UNINA