1st Edition

Security in Distributed, Grid, Mobile, and Pervasive Computing



ISBN 9780849379215
Published April 17, 2007 by Auerbach Publications
440 Pages 107 B/W Illustrations

USD $150.00

Prices & shipping based on shipping country


Preview

Book Description

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.

A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.

With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.

Table of Contents

SECURITY IN DISTRIBUTED COMPUTING
Security for Content Distribution Networks-Concepts,
Systems and Research Issues
Elisa Bertino and Yunhua Koglin

Key Management and Agreement in Distributed Systems
Venkata C. Giruka, Saikat Chakrabarti, and Mukesh Singhal

Securing Design Patterns for Distributed Systems
Eduardo B. Fernandez and Maria M. Larrondo-Petrie

SECURITY IN MOBILE COMPUTING
Pragmatic Security for ConstrainedWireless Networks
Phillip G. Bradford, Benjamin M. Grizzell, Graylin T. Jay, and Janet Truitt Jenkins

Authentication in Wireless Networks
Saikat Chakrabarti, Venkata C. Giruka, and Mukesh Singhal

Intrusion Detection in Wireless Sensor Networks
Fereshteh Amini, Vojislav B. Mišic, and Jelena Mišic

False Data Detection and Secure Data Aggregation in Wireless Sensor Networks
Hasan Çam and Suat Ozdemir

Privacy and Anonymity in Mobile Ad Hoc Networks
Xiaoyan Hong and Jiejun Kong

Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks
Yang Xiao, Daniel Kay, Yan Zhang, Tianji Li, and Ji Jun

SECURITY IN GRID COMPUTING
State-of-the-Art Security in Grid Computing
Giorgos Kostopoulos, Nicolas Sklavos, and Odysseas Koufopavlou

Unifying Grid and Organizational Security Mechanisms
David W. Chadwick

Grid Security Architecture: Requirements, Fundamentals, Standards and Models
Jose L. Vivas, Javier Lopez, and Jose A. Montenegro

A Trust-Based Access Control Management Framework for a Secure Grid Environment
James B.D. Joshi, Siqing Du, and Saubhagya R. Joshi

Distributed Computing Grids-Safety and Security
Mark Stephens, V.S. Sukumaran Nair, and Jacob A. Abraham

SECURITY IN PERVASIVE COMPUTING
Security Solutions for Pervasive Healthcare
Krishna Venkatasubramanian and Sandeep K.S. Gupta

Wireless Sensor Network Security: A Survey
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary

...
View More