Security in distributed and networking systems / editors, Yang Xiao, Yi Pan.
Material type:
TextSeries: Computer and network security ; v. 1.Publication details: Singapore ; Hackensack, NJ : World Scientific, ©2007.Description: 1 online resource (xvi, 493 pages) : illustrations, color portraitsContent type: - text
- computer
- online resource
- 9789812770103
- 9812770100
- Computer networks -- Security measures
- Distributed operating systems (Computers) -- Security measures
- Electronic data processing -- Distributed processing
- Réseaux d'ordinateurs -- Sécurité -- Mesures
- Systèmes d'exploitation répartis -- Sécurité -- Mesures
- Traitement réparti
- COMPUTERS -- Operating Systems -- General
- Computer networks -- Security measures
- Electronic data processing -- Distributed processing
- 005.44 22
- QA76.9.A25 S434 2007eb
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | EBSCO Computers | Available |
Includes bibliographical references.
Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.
Print version record.
Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy.
Added to collection customer.56279.3