1st Edition
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.
A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.
Security for Content Distribution Networks-Concepts,
Systems and Research Issues
Elisa Bertino and Yunhua Koglin
Key Management and Agreement in Distributed Systems
Venkata C. Giruka, Saikat Chakrabarti, and Mukesh Singhal
Securing Design Patterns for Distributed Systems
Eduardo B. Fernandez and Maria M. Larrondo-Petrie
SECURITY IN MOBILE COMPUTING
Pragmatic Security for ConstrainedWireless Networks
Phillip G. Bradford, Benjamin M. Grizzell, Graylin T. Jay, and Janet Truitt Jenkins
Authentication in Wireless Networks
Saikat Chakrabarti, Venkata C. Giruka, and Mukesh Singhal
Intrusion Detection in Wireless Sensor Networks
Fereshteh Amini, Vojislav B. Mišic, and Jelena Mišic
False Data Detection and Secure Data Aggregation in Wireless Sensor Networks
Hasan Çam and Suat Ozdemir
Privacy and Anonymity in Mobile Ad Hoc Networks
Xiaoyan Hong and Jiejun Kong
Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks
Yang Xiao, Daniel Kay, Yan Zhang, Tianji Li, and Ji Jun
SECURITY IN GRID COMPUTING
State-of-the-Art Security in Grid Computing
Giorgos Kostopoulos, Nicolas Sklavos, and Odysseas Koufopavlou
Unifying Grid and Organizational Security Mechanisms
David W. Chadwick
Grid Security Architecture: Requirements, Fundamentals, Standards and Models
Jose L. Vivas, Javier Lopez, and Jose A. Montenegro
A Trust-Based Access Control Management Framework for a Secure Grid Environment
James B.D. Joshi, Siqing Du, and Saubhagya R. Joshi
Distributed Computing Grids-Safety and Security
Mark Stephens, V.S. Sukumaran Nair, and Jacob A. Abraham
SECURITY IN PERVASIVE COMPUTING
Security Solutions for Pervasive Healthcare
Krishna Venkatasubramanian and Sandeep K.S. Gupta
Wireless Sensor Network Security: A Survey
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary
Biography
Yang Xiao