top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AI, Simulation and Planning in High Autonomy Systems, 5th Conference
AI, Simulation and Planning in High Autonomy Systems, 5th Conference
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society Press, 1994
Descrizione fisica 1 online resource (xii, 287 pages) : illustrations
Disciplina 006.3
Soggetto topico Command and control systems
Distributed operating systems (Computers)
Artificial intelligence Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996198226303316
[Place of publication not identified], : IEEE Computer Society Press, 1994
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
AI, Simulation and Planning in High Autonomy Systems, 5th Conference
AI, Simulation and Planning in High Autonomy Systems, 5th Conference
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society Press, 1994
Descrizione fisica 1 online resource (xii, 287 pages) : illustrations
Disciplina 006.3
Soggetto topico Command and control systems
Distributed operating systems (Computers)
Artificial intelligence Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910872759703321
[Place of publication not identified], : IEEE Computer Society Press, 1994
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner
Autore Lang Ulrich
Pubbl/distr/stampa Boston : , : Artech House, , ©2002
Descrizione fisica 1 online resource (332 p.)
Disciplina 005.8
Altri autori (Persone) SchreinerRudolf
Collana Artech House computer security series
Soggetto topico CORBA (Computer architecture)
Distributed operating systems (Computers)
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-58053-561-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140
References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259
6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301
Record Nr. UNINA-9910455780903321
Lang Ulrich  
Boston : , : Artech House, , ©2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner
Autore Lang Ulrich
Pubbl/distr/stampa Boston : , : Artech House, , ©2002
Descrizione fisica 1 online resource (332 p.)
Disciplina 005.8
Altri autori (Persone) SchreinerRudolf
Collana Artech House computer security series
Soggetto topico CORBA (Computer architecture)
Distributed operating systems (Computers)
Computer security
ISBN 1-58053-561-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140
References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259
6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301
Record Nr. UNINA-9910780161703321
Lang Ulrich  
Boston : , : Artech House, , ©2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner
Autore Lang Ulrich
Edizione [1st ed.]
Pubbl/distr/stampa Boston, : Artech House, c2002
Descrizione fisica 1 online resource (332 p.)
Disciplina 005.8
Altri autori (Persone) SchreinerRudolf
Collana Artech House computer security series
Soggetto topico CORBA (Computer architecture)
Distributed operating systems (Computers)
Computer security
ISBN 1-58053-561-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140
References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259
6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301
Record Nr. UNINA-9910823229103321
Lang Ulrich  
Boston, : Artech House, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed operating systems / Andrew S. Tanenbaum
Distributed operating systems / Andrew S. Tanenbaum
Autore Tanenbaum, Andrew S.
Pubbl/distr/stampa Englewood Cliffs, N.J. : Prentice Hall, c1995
Descrizione fisica xvii, 614 p. : ill. ; 25 cm
Disciplina 005.4476
Soggetto topico Distributed operating systems (Computers)
ISBN 0131439340
Classificazione AMS 68N25
CR D.4.7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991000832229707536
Tanenbaum, Andrew S.  
Englewood Cliffs, N.J. : Prentice Hall, c1995
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Distributed serverless architectures on AWS : design and implement serverless architectures / / Jithin Jude Paul
Distributed serverless architectures on AWS : design and implement serverless architectures / / Jithin Jude Paul
Autore Paul Jithin Jude
Edizione [1st ed. 2023.]
Pubbl/distr/stampa New York, New York : , : Apress Media LLC, , [2023]
Descrizione fisica 1 online resource (161 pages)
Disciplina 004.6782
Soggetto topico Cloud computing
Computer architecture
Distributed operating systems (Computers)
ISBN 1-4842-9159-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction to Serveless Architectures -- Chapter 2: Distributed Serverless Architectures -- Chapter 3: Event Driven Architectures -- Chapter 4: Disaster Recovery Architectures -- Chapter 5: Serverless Data Platforms -- Chapter 6: Containers on Serverless -- Chapter 7: Multi-Cloud Architectures -- Chapter 8: Serverless through AWS Well-Architected Framework -- Chapter 9: Looking Ahead.
Record Nr. UNINA-9910672451403321
Paul Jithin Jude  
New York, New York : , : Apress Media LLC, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed systems : concepts and design / / George Coulouris [and five others]
Distributed systems : concepts and design / / George Coulouris [and five others]
Autore Coulouris George F.
Edizione [Fifth edition.]
Pubbl/distr/stampa Boston : , : Addison-Wesley, , [2012]
Descrizione fisica 1 online resource (1,064 pages) : illustrations
Disciplina 004.36
Altri autori (Persone) BhattacharjeeArup Kumar
MukherjeeSoumen
Soggetto topico Electronic data processing - Distributed processing
Distributed operating systems (Computers)
ISBN 1-4479-3017-7
9781447930174
9780273760597
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- CONTENTS -- PREFACE -- 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS -- 1.1 Introduction -- 1.2 Examples of distributed systems -- 1.3 Trends in distributed systems -- 1.4 Focus on resource sharing -- 1.5 Challenges -- 1.6 Case study: The World Wide Web -- 1.7 Summary -- 2 SYSTEM MODELS -- 2.1 Introduction -- 2.2 Physical models -- 2.3 Architectural models -- 2.4 Fundamental models -- 2.5 Summary -- 3 NETWORKING AND INTERNETWORKING -- 3.1 Introduction -- 3.2 Types of network -- 3.3 Network principles -- 3.4 Internet protocols -- 3.5 Case studies: Ethernet, WiFi and Bluetooth -- 3.6 Summary -- 4 INTERPROCESS COMMUNICATION -- 4.1 Introduction -- 4.2 The API for the Internet protocols -- 4.3 External data representation and marshalling -- 4.4 Multicast communication -- 4.5 Network virtualization: Overlay networks -- 4.6 Case study: MPI -- 4.7 Summary -- 5 REMOTE INVOCATION -- 5.1 Introduction -- 5.2 Request-reply protocols -- 5.3 Remote procedure call -- 5.4 Remote method invocation -- 5.5 Case study: Java RMI -- 5.6 Summary -- 6 INDIRECT COMMUNICATION -- 6.1 Introduction -- 6.2 Group communication -- 6.3 Publish-subscribe systems -- 6.4 Message queues -- 6.5 Shared memory approaches -- 6.6 Summary -- 7 OPERATING SYSTEM SUPPORT -- 7.1 Introduction -- 7.2 The operating system layer -- 7.3 Protection -- 7.4 Processes and threads -- 7.5 Communication and invocation -- 7.6 Operating system architecture -- 7.7 Virtualization at the operating system level -- 7.8 Summary -- 8 DISTRIBUTED OBJECTS AND COMPONENTS -- 8.1 Introduction -- 8.2 Distributed objects -- 8.3 Case study: CORBA -- 8.4 From objects to components -- 8.5 Case studies: Enterprise JavaBeans and Fractal -- 8.6 Summary -- 9 WEB SERVICES -- 9.1 Introduction -- 9.2 Web services -- 9.3 Service descriptions and IDL for web services -- 9.4 A directory service for use with web services -- 9.5 XML security -- 9.6 Coordination of web services -- 9.7 Applications of web services -- 9.8 Summary -- 10 PEER-TO-PEER SYSTEMS -- 10.1 Introduction -- 10.2 Napster and its legacy -- 10.3 Peer-to-peer middleware -- 10.4 Routing overlays -- 10.5 Overlay case studies: Pastry, Tapestry -- 10.6 Application case studies: Squirrel, OceanStore, Ivy -- 10.7 Summary -- 11 SECURITY -- 11.1 Introduction -- 11.2 Overview of security techniques -- 11.3 Cryptographic algorithms -- 11.4 Digital signatures -- 11.5 Cryptography pragmatics -- 11.6 Case studies: Needham-Schroeder, Kerberos, TLS, 802.11 WiFi -- 11.7 Summary -- 12 DISTRIBUTED FILE SYSTEMS -- 12.1 Introduction -- 12.2 File service architecture -- 12.3 Case study: Sun Network File System -- 12.4 Case study: The Andrew File System -- 12.5 Enhancements and further developments -- 12.6 Summary -- 13 NAME SERVICES -- 13.1 Introduction -- 13.2 Name services and the Domain Name System -- 13.3 Directory services -- 13.4 Case study: The Global Name Service -- 13.5 Case study: The X.500 Directory Service -- 13.6 Summary -- 14 TIME AND GLOBAL STATES -- 14.1 Introduction -- 14.2 Clocks, events and process states -- 14.3 Synchronizing physical clocks -- 14.4 Logical time and logical clocks -- 14.5 Global states -- 14.6 Distributed debugging -- 14.7 Summary -- 15 COORDINATION AND AGREEMENT -- 15.1 Introduction -- 15.2 Distributed mutual exclusion -- 15.3 Elections -- 15.4 Coordination and agreement in group communication -- 15.5 Consensus and related problems -- 15.6 Summary -- 16 TRANSACTIONS AND CONCURRENCY CONTROL -- 16.1 Introduction -- 16.2 Transactions -- 16.3 Nested transactions -- 16.4 Locks -- 16.5 Optimistic concurrency control -- 16.6 Timestamp ordering -- 16.7 Comparison of methods for concurrency control -- 16.8 Summary -- 17 DISTRIBUTED TRANSACTIONS -- 17.1 Introduction -- 17.2 Flat and nested distributed transactions -- 17.3 Atomic commit protocols -- 17.4 Concurrency control in distributed transactions -- 17.5 Distributed deadlocks -- 17.6 Transaction recovery -- 17.7 Summary -- 18 REPLICATION -- 18.1 Introduction -- 18.2 System model and the role of group communication -- 18.3 Fault-tolerant services -- 18.4 Case studies of highly available services: The gossip architecture, Bayou and Coda -- 18.5 Transactions with replicated data -- 18.6 Summary -- 19 MOBILE AND UBIQUITOUS COMPUTING -- 19.1 Introduction -- 19.2 Association -- 19.3 Interoperation -- 19.4 Sensing and context awareness -- 19.5 Security and privacy -- 19.6 Adaptation -- 19.7 Case study: Cooltown -- 19.8 Summary -- 20 DISTRIBUTED MULTIMEDIA SYSTEMS -- 20.1 Introduction -- 20.2 Characteristics of multimedia data -- 20.3 Quality of service management -- 20.4 Resource management -- 20.5 Stream adaptation -- 20.6 Case studies: Tiger, BitTorrent and End System Multicast -- 20.7 Summary -- 21 DESIGNING DISTRIBUTED SYSTEMS: GOOGLE CASE STUDY -- 21.1 Introduction -- 21.2 Introducing the case study: Google -- 21.3 Overall architecture and design philosophy -- 21.4 Underlying communication paradigms -- 21.5 Data storage and coordination services -- 21.6 Distributed computation services -- 21.7 Summary -- REFERENCES -- INDEX.
Record Nr. UNINA-9910151656503321
Coulouris George F.  
Boston : , : Addison-Wesley, , [2012]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed systems : principles and paradigms / / Andrew S. Tanenbaum, Maarten Van Steen
Distributed systems : principles and paradigms / / Andrew S. Tanenbaum, Maarten Van Steen
Autore Tanenbaum Andrew S.
Edizione [Second edition, Pearson New International Edition.]
Pubbl/distr/stampa Harlow, England : , : Pearson, , [2014]
Descrizione fisica 1 online resource (633 pages) : illustrations
Disciplina 004.36
Collana Always learning
Soggetto topico Electronic data processing - Distributed processing
Distributed operating systems (Computers)
ISBN 1-292-03800-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Table of Contents -- Chapter 1. Introduction -- Chapter 2. Architectures -- Chapter 3. Processes -- Chapter 4. Communication -- Chapter 5. Naming -- Chapter 6. Synchronization -- Chapter 7. Consistency and Replication -- Chapter 8. Fault Tolerance -- Chapter 9. Security -- Chapter 10. Distributed Object-Based Systems -- Chapter 11. Distributed File Systems -- Chapter 12. Distributed Web-Based Systems -- Chapter 13. Distributed Coordination-Based Systems -- Index.
Record Nr. UNINA-9910153094603321
Tanenbaum Andrew S.  
Harlow, England : , : Pearson, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IEEE Std 802.15.8-2017 : IEEE Standard for Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Peer Aware Communications (PAC) / / Institute of Electrical and Electronics Engineers
IEEE Std 802.15.8-2017 : IEEE Standard for Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Peer Aware Communications (PAC) / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa New York : , : IEEE, , [2018]
Descrizione fisica 1 online resource (322 pages)
Disciplina 005.44
Soggetto topico Distributed operating systems (Computers)
ISBN 1-5044-4612-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 802.15.8-2017 - IEEE Standard for Wireless Medium Access Control
Record Nr. UNINA-9910258756103321
New York : , : IEEE, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui