Trust and security in collaborative computing:
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions o...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
World Scientific Pub. Co.
c2008
|
Schlagworte: | |
Online-Zugang: | FHN01 Volltext |
Zusammenfassung: | Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described |
Beschreibung: | xvii, 229 p. ill |
ISBN: | 9812790888 9789812790880 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044635364 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 171120s2008 |||| o||u| ||||||eng d | ||
020 | |a 9812790888 |c electronic bk. |9 981-279-088-8 | ||
020 | |a 9789812790880 |c electronic bk. |9 978-981-279-088-0 | ||
024 | 7 | |a 10.1142/6297 |2 doi | |
035 | |a (ZDB-124-WOP)00001925 | ||
035 | |a (OCoLC)1012657892 | ||
035 | |a (DE-599)BVBBV044635364 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Zou, Xukai |d 1963- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trust and security in collaborative computing |c Xukai Zou, Yuan-Shun Dai, Yi Pan |
264 | 1 | |a Singapore |b World Scientific Pub. Co. |c c2008 | |
300 | |a xvii, 229 p. |b ill | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Groupware (Computer software) | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | 1 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Dai, Yuan-Shun |e Sonstige |4 oth | |
700 | 1 | |a Pan, Yi |d 1960- |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.worldscientific.com/worldscibooks/10.1142/6297#t=toc |x Verlag |z URL des Erstveroeffentlichers |3 Volltext |
912 | |a ZDB-124-WOP | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030033336 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.worldscientific.com/worldscibooks/10.1142/6297#t=toc |l FHN01 |p ZDB-124-WOP |q FHN_PDA_WOP |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178048301400064 |
---|---|
any_adam_object | |
author | Zou, Xukai 1963- |
author_facet | Zou, Xukai 1963- |
author_role | aut |
author_sort | Zou, Xukai 1963- |
author_variant | x z xz |
building | Verbundindex |
bvnumber | BV044635364 |
collection | ZDB-124-WOP |
ctrlnum | (ZDB-124-WOP)00001925 (OCoLC)1012657892 (DE-599)BVBBV044635364 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02724nmm a2200481zc 4500</leader><controlfield tag="001">BV044635364</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">171120s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812790888</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-279-088-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812790880</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-279-088-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1142/6297</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-124-WOP)00001925 </subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1012657892</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044635364</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zou, Xukai</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust and security in collaborative computing</subfield><subfield code="c">Xukai Zou, Yuan-Shun Dai, Yi Pan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">World Scientific Pub. Co.</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 229 p.</subfield><subfield code="b">ill</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Groupware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dai, Yuan-Shun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pan, Yi</subfield><subfield code="d">1960-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.worldscientific.com/worldscibooks/10.1142/6297#t=toc</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveroeffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-124-WOP</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030033336</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.worldscientific.com/worldscibooks/10.1142/6297#t=toc</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-124-WOP</subfield><subfield code="q">FHN_PDA_WOP</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044635364 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:57:46Z |
institution | BVB |
isbn | 9812790888 9789812790880 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030033336 |
oclc_num | 1012657892 |
open_access_boolean | |
owner | DE-92 |
owner_facet | DE-92 |
physical | xvii, 229 p. ill |
psigel | ZDB-124-WOP ZDB-124-WOP FHN_PDA_WOP |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | World Scientific Pub. Co. |
record_format | marc |
spelling | Zou, Xukai 1963- Verfasser aut Trust and security in collaborative computing Xukai Zou, Yuan-Shun Dai, Yi Pan Singapore World Scientific Pub. Co. c2008 xvii, 229 p. ill txt rdacontent c rdamedia cr rdacarrier Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described Computer security Groupware (Computer software) Computer networks / Security measures Trusted Computing (DE-588)7562931-8 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Verteiltes System (DE-588)4238872-7 s Trusted Computing (DE-588)7562931-8 s 1\p DE-604 Dai, Yuan-Shun Sonstige oth Pan, Yi 1960- Sonstige oth http://www.worldscientific.com/worldscibooks/10.1142/6297#t=toc Verlag URL des Erstveroeffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Zou, Xukai 1963- Trust and security in collaborative computing Computer security Groupware (Computer software) Computer networks / Security measures Trusted Computing (DE-588)7562931-8 gnd Verteiltes System (DE-588)4238872-7 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)4238872-7 |
title | Trust and security in collaborative computing |
title_auth | Trust and security in collaborative computing |
title_exact_search | Trust and security in collaborative computing |
title_full | Trust and security in collaborative computing Xukai Zou, Yuan-Shun Dai, Yi Pan |
title_fullStr | Trust and security in collaborative computing Xukai Zou, Yuan-Shun Dai, Yi Pan |
title_full_unstemmed | Trust and security in collaborative computing Xukai Zou, Yuan-Shun Dai, Yi Pan |
title_short | Trust and security in collaborative computing |
title_sort | trust and security in collaborative computing |
topic | Computer security Groupware (Computer software) Computer networks / Security measures Trusted Computing (DE-588)7562931-8 gnd Verteiltes System (DE-588)4238872-7 gnd |
topic_facet | Computer security Groupware (Computer software) Computer networks / Security measures Trusted Computing Verteiltes System |
url | http://www.worldscientific.com/worldscibooks/10.1142/6297#t=toc |
work_keys_str_mv | AT zouxukai trustandsecurityincollaborativecomputing AT daiyuanshun trustandsecurityincollaborativecomputing AT panyi trustandsecurityincollaborativecomputing |