AI, Simulation and Planning in High Autonomy Systems, 5th Conference |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1994 |
Descrizione fisica | 1 online resource (xii, 287 pages) : illustrations |
Disciplina | 006.3 |
Soggetto topico |
Command and control systems
Distributed operating systems (Computers) Artificial intelligence Congresses |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996198226303316 |
[Place of publication not identified], : IEEE Computer Society Press, 1994 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
AI, Simulation and Planning in High Autonomy Systems, 5th Conference |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1994 |
Descrizione fisica | 1 online resource (xii, 287 pages) : illustrations |
Disciplina | 006.3 |
Soggetto topico |
Command and control systems
Distributed operating systems (Computers) Artificial intelligence Congresses |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910872759703321 |
[Place of publication not identified], : IEEE Computer Society Press, 1994 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner |
Autore | Lang Ulrich |
Pubbl/distr/stampa | Boston : , : Artech House, , ©2002 |
Descrizione fisica | 1 online resource (332 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SchreinerRudolf |
Collana | Artech House computer security series |
Soggetto topico |
CORBA (Computer architecture)
Distributed operating systems (Computers) Computer security |
Soggetto genere / forma | Electronic books. |
ISBN | 1-58053-561-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140 References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259 6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301 |
Record Nr. | UNINA-9910455780903321 |
Lang Ulrich | ||
Boston : , : Artech House, , ©2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner |
Autore | Lang Ulrich |
Pubbl/distr/stampa | Boston : , : Artech House, , ©2002 |
Descrizione fisica | 1 online resource (332 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SchreinerRudolf |
Collana | Artech House computer security series |
Soggetto topico |
CORBA (Computer architecture)
Distributed operating systems (Computers) Computer security |
ISBN | 1-58053-561-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140 References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259 6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301 |
Record Nr. | UNINA-9910780161703321 |
Lang Ulrich | ||
Boston : , : Artech House, , ©2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner |
Autore | Lang Ulrich |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boston, : Artech House, c2002 |
Descrizione fisica | 1 online resource (332 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SchreinerRudolf |
Collana | Artech House computer security series |
Soggetto topico |
CORBA (Computer architecture)
Distributed operating systems (Computers) Computer security |
ISBN | 1-58053-561-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140 References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259 6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301 |
Record Nr. | UNINA-9910823229103321 |
Lang Ulrich | ||
Boston, : Artech House, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Distributed operating systems / Andrew S. Tanenbaum |
Autore | Tanenbaum, Andrew S. |
Pubbl/distr/stampa | Englewood Cliffs, N.J. : Prentice Hall, c1995 |
Descrizione fisica | xvii, 614 p. : ill. ; 25 cm |
Disciplina | 005.4476 |
Soggetto topico | Distributed operating systems (Computers) |
ISBN | 0131439340 |
Classificazione |
AMS 68N25
CR D.4.7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991000832229707536 |
Tanenbaum, Andrew S. | ||
Englewood Cliffs, N.J. : Prentice Hall, c1995 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Salento | ||
|
Distributed serverless architectures on AWS : design and implement serverless architectures / / Jithin Jude Paul |
Autore | Paul Jithin Jude |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | New York, New York : , : Apress Media LLC, , [2023] |
Descrizione fisica | 1 online resource (161 pages) |
Disciplina | 004.6782 |
Soggetto topico |
Cloud computing
Computer architecture Distributed operating systems (Computers) |
ISBN | 1-4842-9159-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction to Serveless Architectures -- Chapter 2: Distributed Serverless Architectures -- Chapter 3: Event Driven Architectures -- Chapter 4: Disaster Recovery Architectures -- Chapter 5: Serverless Data Platforms -- Chapter 6: Containers on Serverless -- Chapter 7: Multi-Cloud Architectures -- Chapter 8: Serverless through AWS Well-Architected Framework -- Chapter 9: Looking Ahead. |
Record Nr. | UNINA-9910672451403321 |
Paul Jithin Jude | ||
New York, New York : , : Apress Media LLC, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Distributed systems : concepts and design / / George Coulouris [and five others] |
Autore | Coulouris George F. |
Edizione | [Fifth edition.] |
Pubbl/distr/stampa | Boston : , : Addison-Wesley, , [2012] |
Descrizione fisica | 1 online resource (1,064 pages) : illustrations |
Disciplina | 004.36 |
Altri autori (Persone) |
BhattacharjeeArup Kumar
MukherjeeSoumen |
Soggetto topico |
Electronic data processing - Distributed processing
Distributed operating systems (Computers) |
ISBN |
1-4479-3017-7
9781447930174 9780273760597 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover -- CONTENTS -- PREFACE -- 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS -- 1.1 Introduction -- 1.2 Examples of distributed systems -- 1.3 Trends in distributed systems -- 1.4 Focus on resource sharing -- 1.5 Challenges -- 1.6 Case study: The World Wide Web -- 1.7 Summary -- 2 SYSTEM MODELS -- 2.1 Introduction -- 2.2 Physical models -- 2.3 Architectural models -- 2.4 Fundamental models -- 2.5 Summary -- 3 NETWORKING AND INTERNETWORKING -- 3.1 Introduction -- 3.2 Types of network -- 3.3 Network principles -- 3.4 Internet protocols -- 3.5 Case studies: Ethernet, WiFi and Bluetooth -- 3.6 Summary -- 4 INTERPROCESS COMMUNICATION -- 4.1 Introduction -- 4.2 The API for the Internet protocols -- 4.3 External data representation and marshalling -- 4.4 Multicast communication -- 4.5 Network virtualization: Overlay networks -- 4.6 Case study: MPI -- 4.7 Summary -- 5 REMOTE INVOCATION -- 5.1 Introduction -- 5.2 Request-reply protocols -- 5.3 Remote procedure call -- 5.4 Remote method invocation -- 5.5 Case study: Java RMI -- 5.6 Summary -- 6 INDIRECT COMMUNICATION -- 6.1 Introduction -- 6.2 Group communication -- 6.3 Publish-subscribe systems -- 6.4 Message queues -- 6.5 Shared memory approaches -- 6.6 Summary -- 7 OPERATING SYSTEM SUPPORT -- 7.1 Introduction -- 7.2 The operating system layer -- 7.3 Protection -- 7.4 Processes and threads -- 7.5 Communication and invocation -- 7.6 Operating system architecture -- 7.7 Virtualization at the operating system level -- 7.8 Summary -- 8 DISTRIBUTED OBJECTS AND COMPONENTS -- 8.1 Introduction -- 8.2 Distributed objects -- 8.3 Case study: CORBA -- 8.4 From objects to components -- 8.5 Case studies: Enterprise JavaBeans and Fractal -- 8.6 Summary -- 9 WEB SERVICES -- 9.1 Introduction -- 9.2 Web services -- 9.3 Service descriptions and IDL for web services -- 9.4 A directory service for use with web services -- 9.5 XML security -- 9.6 Coordination of web services -- 9.7 Applications of web services -- 9.8 Summary -- 10 PEER-TO-PEER SYSTEMS -- 10.1 Introduction -- 10.2 Napster and its legacy -- 10.3 Peer-to-peer middleware -- 10.4 Routing overlays -- 10.5 Overlay case studies: Pastry, Tapestry -- 10.6 Application case studies: Squirrel, OceanStore, Ivy -- 10.7 Summary -- 11 SECURITY -- 11.1 Introduction -- 11.2 Overview of security techniques -- 11.3 Cryptographic algorithms -- 11.4 Digital signatures -- 11.5 Cryptography pragmatics -- 11.6 Case studies: Needham-Schroeder, Kerberos, TLS, 802.11 WiFi -- 11.7 Summary -- 12 DISTRIBUTED FILE SYSTEMS -- 12.1 Introduction -- 12.2 File service architecture -- 12.3 Case study: Sun Network File System -- 12.4 Case study: The Andrew File System -- 12.5 Enhancements and further developments -- 12.6 Summary -- 13 NAME SERVICES -- 13.1 Introduction -- 13.2 Name services and the Domain Name System -- 13.3 Directory services -- 13.4 Case study: The Global Name Service -- 13.5 Case study: The X.500 Directory Service -- 13.6 Summary -- 14 TIME AND GLOBAL STATES -- 14.1 Introduction -- 14.2 Clocks, events and process states -- 14.3 Synchronizing physical clocks -- 14.4 Logical time and logical clocks -- 14.5 Global states -- 14.6 Distributed debugging -- 14.7 Summary -- 15 COORDINATION AND AGREEMENT -- 15.1 Introduction -- 15.2 Distributed mutual exclusion -- 15.3 Elections -- 15.4 Coordination and agreement in group communication -- 15.5 Consensus and related problems -- 15.6 Summary -- 16 TRANSACTIONS AND CONCURRENCY CONTROL -- 16.1 Introduction -- 16.2 Transactions -- 16.3 Nested transactions -- 16.4 Locks -- 16.5 Optimistic concurrency control -- 16.6 Timestamp ordering -- 16.7 Comparison of methods for concurrency control -- 16.8 Summary -- 17 DISTRIBUTED TRANSACTIONS -- 17.1 Introduction -- 17.2 Flat and nested distributed transactions -- 17.3 Atomic commit protocols -- 17.4 Concurrency control in distributed transactions -- 17.5 Distributed deadlocks -- 17.6 Transaction recovery -- 17.7 Summary -- 18 REPLICATION -- 18.1 Introduction -- 18.2 System model and the role of group communication -- 18.3 Fault-tolerant services -- 18.4 Case studies of highly available services: The gossip architecture, Bayou and Coda -- 18.5 Transactions with replicated data -- 18.6 Summary -- 19 MOBILE AND UBIQUITOUS COMPUTING -- 19.1 Introduction -- 19.2 Association -- 19.3 Interoperation -- 19.4 Sensing and context awareness -- 19.5 Security and privacy -- 19.6 Adaptation -- 19.7 Case study: Cooltown -- 19.8 Summary -- 20 DISTRIBUTED MULTIMEDIA SYSTEMS -- 20.1 Introduction -- 20.2 Characteristics of multimedia data -- 20.3 Quality of service management -- 20.4 Resource management -- 20.5 Stream adaptation -- 20.6 Case studies: Tiger, BitTorrent and End System Multicast -- 20.7 Summary -- 21 DESIGNING DISTRIBUTED SYSTEMS: GOOGLE CASE STUDY -- 21.1 Introduction -- 21.2 Introducing the case study: Google -- 21.3 Overall architecture and design philosophy -- 21.4 Underlying communication paradigms -- 21.5 Data storage and coordination services -- 21.6 Distributed computation services -- 21.7 Summary -- REFERENCES -- INDEX. |
Record Nr. | UNINA-9910151656503321 |
Coulouris George F. | ||
Boston : , : Addison-Wesley, , [2012] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Distributed systems : principles and paradigms / / Andrew S. Tanenbaum, Maarten Van Steen |
Autore | Tanenbaum Andrew S. |
Edizione | [Second edition, Pearson New International Edition.] |
Pubbl/distr/stampa | Harlow, England : , : Pearson, , [2014] |
Descrizione fisica | 1 online resource (633 pages) : illustrations |
Disciplina | 004.36 |
Collana | Always learning |
Soggetto topico |
Electronic data processing - Distributed processing
Distributed operating systems (Computers) |
ISBN | 1-292-03800-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover -- Table of Contents -- Chapter 1. Introduction -- Chapter 2. Architectures -- Chapter 3. Processes -- Chapter 4. Communication -- Chapter 5. Naming -- Chapter 6. Synchronization -- Chapter 7. Consistency and Replication -- Chapter 8. Fault Tolerance -- Chapter 9. Security -- Chapter 10. Distributed Object-Based Systems -- Chapter 11. Distributed File Systems -- Chapter 12. Distributed Web-Based Systems -- Chapter 13. Distributed Coordination-Based Systems -- Index. |
Record Nr. | UNINA-9910153094603321 |
Tanenbaum Andrew S. | ||
Harlow, England : , : Pearson, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IEEE Std 802.15.8-2017 : IEEE Standard for Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Peer Aware Communications (PAC) / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | New York : , : IEEE, , [2018] |
Descrizione fisica | 1 online resource (322 pages) |
Disciplina | 005.44 |
Soggetto topico | Distributed operating systems (Computers) |
ISBN | 1-5044-4612-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 802.15.8-2017 - IEEE Standard for Wireless Medium Access Control |
Record Nr. | UNINA-9910258756103321 |
New York : , : IEEE, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|