Trust and security in collaborative computing /:
"Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet." "This mono...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hackensack, NJ :
World Scientific,
©2008.
|
Schriftenreihe: | Computer and network security ;
v. 2. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet." "This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described."--Jacket |
Beschreibung: | 1 online resource (xvii, 229 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9789812703682 9812703683 9812790888 9789812790880 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn298229756 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr mn||||||||| | ||
008 | 090113s2008 njua ob 001 0 eng d | ||
040 | |a OSU |b eng |e pn |c OSU |d CDX |d DLC |d IG# |d OCLCQ |d N$T |d YDXCP |d IDEBK |d OCLCQ |d E7B |d OCLCQ |d OCLCF |d OCLCQ |d M6U |d OCLCQ |d AZK |d INTCL |d LOA |d JBG |d COCUF |d AGLDB |d CNNOR |d MOR |d PIFAG |d OTZ |d OCLCQ |d OCLCA |d BRL |d STF |d WRM |d OCLCQ |d VTS |d NRAMU |d OCLCQ |d VT2 |d OCLCQ |d WYU |d A6Q |d M8D |d UKAHL |d UKCRE |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 262621123 |a 646769025 |a 696629527 |a 961542557 |a 962595619 |a 968299051 |a 988449581 |a 992050317 |a 994896091 |a 1037496528 |a 1037758565 |a 1038629602 |a 1045467079 |a 1055401714 |a 1062889935 |a 1063995129 |a 1081295906 |a 1083604008 |a 1153529167 |a 1228550728 | ||
020 | |a 9789812703682 | ||
020 | |a 9812703683 | ||
020 | |a 9812790888 |q (ebook) | ||
020 | |a 9789812790880 |q (ebook) | ||
035 | |a (OCoLC)298229756 |z (OCoLC)262621123 |z (OCoLC)646769025 |z (OCoLC)696629527 |z (OCoLC)961542557 |z (OCoLC)962595619 |z (OCoLC)968299051 |z (OCoLC)988449581 |z (OCoLC)992050317 |z (OCoLC)994896091 |z (OCoLC)1037496528 |z (OCoLC)1037758565 |z (OCoLC)1038629602 |z (OCoLC)1045467079 |z (OCoLC)1055401714 |z (OCoLC)1062889935 |z (OCoLC)1063995129 |z (OCoLC)1081295906 |z (OCoLC)1083604008 |z (OCoLC)1153529167 |z (OCoLC)1228550728 | ||
050 | 4 | |a QA76.9.A25 |b Z69 2008 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Zou, Xukai, |d 1963- |1 https://id.oclc.org/worldcat/entity/E39PCjCXg4Ch4jBgyP4KMtpDxC |0 http://id.loc.gov/authorities/names/n2004014770 | |
245 | 1 | 0 | |a Trust and security in collaborative computing / |c Xukai Zou, Yuan-Shun Dai, Yi Pan. |
260 | |a Hackensack, NJ : |b World Scientific, |c ©2008. | ||
300 | |a 1 online resource (xvii, 229 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Computer and network security ; |v v. 2 | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | 0 | |g Machine generated contents note: |g 1. |t Introduction -- |g 2. |t Secure Group Communication (SCG) -- |g 3. |t Cryptography based Access Control -- |g 4. |t Intrusion Detection and Defense -- |g 5. |t Reliability in Grid Computing -- |g 6. |t Security in Grid Computing -- |g 7. |t Trusted and Seamless Medical Information Systems. |
520 | |a "Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet." "This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described."--Jacket | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Groupware (Computer software) |0 http://id.loc.gov/authorities/subjects/sh96000835 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Logiciels de groupe. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Groupware (Computer software) |2 fast | |
700 | 1 | |a Dai, Yuan-Shun. |0 http://id.loc.gov/authorities/names/n2004001672 | |
700 | 1 | |a Pan, Yi, |d 1960- |1 https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3 |0 http://id.loc.gov/authorities/names/n98072721 | |
758 | |i has work: |a Trust and security in collaborative computing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFYqccBJRrGm8RkyGY36Dq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 1 | |a Zou, Xukai, 1963- |t Trust and security in collaborative computing. |d Hackensack, NJ : World Scientific, ©2008 |z 9789812703682 |w (DLC) 2008273479 |w (OCoLC)227206004 | |
830 | 0 | |a Computer and network security ; |v v. 2. |0 http://id.loc.gov/authorities/names/no2008008076 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=236058 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH24684926 | ||
938 | |a Coutts Information Services |b COUT |n 9528552 | ||
938 | |a ebrary |b EBRY |n ebr10255980 | ||
938 | |a EBSCOhost |b EBSC |n 236058 | ||
938 | |a Ingram |b INGR |n 9789812703682 | ||
938 | |a YBP Library Services |b YANK |n 2891968 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn298229756 |
---|---|
_version_ | 1816881684337917952 |
adam_text | |
any_adam_object | |
author | Zou, Xukai, 1963- |
author2 | Dai, Yuan-Shun Pan, Yi, 1960- |
author2_role | |
author2_variant | y s d ysd y p yp |
author_GND | http://id.loc.gov/authorities/names/n2004014770 http://id.loc.gov/authorities/names/n2004001672 http://id.loc.gov/authorities/names/n98072721 |
author_facet | Zou, Xukai, 1963- Dai, Yuan-Shun Pan, Yi, 1960- |
author_role | |
author_sort | Zou, Xukai, 1963- |
author_variant | x z xz |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 Z69 2008 |
callnumber-search | QA76.9.A25 Z69 2008 |
callnumber-sort | QA 276.9 A25 Z69 42008 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction -- Secure Group Communication (SCG) -- Cryptography based Access Control -- Intrusion Detection and Defense -- Reliability in Grid Computing -- Security in Grid Computing -- Trusted and Seamless Medical Information Systems. |
ctrlnum | (OCoLC)298229756 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05047cam a2200697 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn298229756</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr mn|||||||||</controlfield><controlfield tag="008">090113s2008 njua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OSU</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OSU</subfield><subfield code="d">CDX</subfield><subfield code="d">DLC</subfield><subfield code="d">IG#</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">INTCL</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OTZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">262621123</subfield><subfield code="a">646769025</subfield><subfield code="a">696629527</subfield><subfield code="a">961542557</subfield><subfield code="a">962595619</subfield><subfield code="a">968299051</subfield><subfield code="a">988449581</subfield><subfield code="a">992050317</subfield><subfield code="a">994896091</subfield><subfield code="a">1037496528</subfield><subfield code="a">1037758565</subfield><subfield code="a">1038629602</subfield><subfield code="a">1045467079</subfield><subfield code="a">1055401714</subfield><subfield code="a">1062889935</subfield><subfield code="a">1063995129</subfield><subfield code="a">1081295906</subfield><subfield code="a">1083604008</subfield><subfield code="a">1153529167</subfield><subfield code="a">1228550728</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812703682</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812703683</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812790888</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812790880</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298229756</subfield><subfield code="z">(OCoLC)262621123</subfield><subfield code="z">(OCoLC)646769025</subfield><subfield code="z">(OCoLC)696629527</subfield><subfield code="z">(OCoLC)961542557</subfield><subfield code="z">(OCoLC)962595619</subfield><subfield code="z">(OCoLC)968299051</subfield><subfield code="z">(OCoLC)988449581</subfield><subfield code="z">(OCoLC)992050317</subfield><subfield code="z">(OCoLC)994896091</subfield><subfield code="z">(OCoLC)1037496528</subfield><subfield code="z">(OCoLC)1037758565</subfield><subfield code="z">(OCoLC)1038629602</subfield><subfield code="z">(OCoLC)1045467079</subfield><subfield code="z">(OCoLC)1055401714</subfield><subfield code="z">(OCoLC)1062889935</subfield><subfield code="z">(OCoLC)1063995129</subfield><subfield code="z">(OCoLC)1081295906</subfield><subfield code="z">(OCoLC)1083604008</subfield><subfield code="z">(OCoLC)1153529167</subfield><subfield code="z">(OCoLC)1228550728</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">Z69 2008</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zou, Xukai,</subfield><subfield code="d">1963-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjCXg4Ch4jBgyP4KMtpDxC</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2004014770</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust and security in collaborative computing /</subfield><subfield code="c">Xukai Zou, Yuan-Shun Dai, Yi Pan.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hackensack, NJ :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 229 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 2</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="g">Machine generated contents note:</subfield><subfield code="g">1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">2.</subfield><subfield code="t">Secure Group Communication (SCG) --</subfield><subfield code="g">3.</subfield><subfield code="t">Cryptography based Access Control --</subfield><subfield code="g">4.</subfield><subfield code="t">Intrusion Detection and Defense --</subfield><subfield code="g">5.</subfield><subfield code="t">Reliability in Grid Computing --</subfield><subfield code="g">6.</subfield><subfield code="t">Security in Grid Computing --</subfield><subfield code="g">7.</subfield><subfield code="t">Trusted and Seamless Medical Information Systems.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet." "This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described."--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Groupware (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh96000835</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels de groupe.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Groupware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dai, Yuan-Shun.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2004001672</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pan, Yi,</subfield><subfield code="d">1960-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98072721</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Trust and security in collaborative computing (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFYqccBJRrGm8RkyGY36Dq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="a">Zou, Xukai, 1963-</subfield><subfield code="t">Trust and security in collaborative computing.</subfield><subfield code="d">Hackensack, NJ : World Scientific, ©2008</subfield><subfield code="z">9789812703682</subfield><subfield code="w">(DLC) 2008273479</subfield><subfield code="w">(OCoLC)227206004</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 2.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008008076</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=236058</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24684926</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">9528552</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10255980</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">236058</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Ingram</subfield><subfield code="b">INGR</subfield><subfield code="n">9789812703682</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2891968</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn298229756 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:37Z |
institution | BVB |
isbn | 9789812703682 9812703683 9812790888 9789812790880 |
language | English |
oclc_num | 298229756 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvii, 229 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | World Scientific, |
record_format | marc |
series | Computer and network security ; |
series2 | Computer and network security ; |
spelling | Zou, Xukai, 1963- https://id.oclc.org/worldcat/entity/E39PCjCXg4Ch4jBgyP4KMtpDxC http://id.loc.gov/authorities/names/n2004014770 Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan. Hackensack, NJ : World Scientific, ©2008. 1 online resource (xvii, 229 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Computer and network security ; v. 2 Includes bibliographical references and index. Print version record. Machine generated contents note: 1. Introduction -- 2. Secure Group Communication (SCG) -- 3. Cryptography based Access Control -- 4. Intrusion Detection and Defense -- 5. Reliability in Grid Computing -- 6. Security in Grid Computing -- 7. Trusted and Seamless Medical Information Systems. "Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet." "This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described."--Jacket Computer security. Groupware (Computer software) http://id.loc.gov/authorities/subjects/sh96000835 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Logiciels de groupe. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Groupware (Computer software) fast Dai, Yuan-Shun. http://id.loc.gov/authorities/names/n2004001672 Pan, Yi, 1960- https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3 http://id.loc.gov/authorities/names/n98072721 has work: Trust and security in collaborative computing (Text) https://id.oclc.org/worldcat/entity/E39PCFYqccBJRrGm8RkyGY36Dq https://id.oclc.org/worldcat/ontology/hasWork Zou, Xukai, 1963- Trust and security in collaborative computing. Hackensack, NJ : World Scientific, ©2008 9789812703682 (DLC) 2008273479 (OCoLC)227206004 Computer and network security ; v. 2. http://id.loc.gov/authorities/names/no2008008076 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=236058 Volltext |
spellingShingle | Zou, Xukai, 1963- Trust and security in collaborative computing / Computer and network security ; Introduction -- Secure Group Communication (SCG) -- Cryptography based Access Control -- Intrusion Detection and Defense -- Reliability in Grid Computing -- Security in Grid Computing -- Trusted and Seamless Medical Information Systems. Computer security. Groupware (Computer software) http://id.loc.gov/authorities/subjects/sh96000835 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Logiciels de groupe. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Groupware (Computer software) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh96000835 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Trust and security in collaborative computing / |
title_alt | Introduction -- Secure Group Communication (SCG) -- Cryptography based Access Control -- Intrusion Detection and Defense -- Reliability in Grid Computing -- Security in Grid Computing -- Trusted and Seamless Medical Information Systems. |
title_auth | Trust and security in collaborative computing / |
title_exact_search | Trust and security in collaborative computing / |
title_full | Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan. |
title_fullStr | Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan. |
title_full_unstemmed | Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan. |
title_short | Trust and security in collaborative computing / |
title_sort | trust and security in collaborative computing |
topic | Computer security. Groupware (Computer software) http://id.loc.gov/authorities/subjects/sh96000835 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Logiciels de groupe. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Groupware (Computer software) fast |
topic_facet | Computer security. Groupware (Computer software) Computer networks Security measures. Sécurité informatique. Logiciels de groupe. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=236058 |
work_keys_str_mv | AT zouxukai trustandsecurityincollaborativecomputing AT daiyuanshun trustandsecurityincollaborativecomputing AT panyi trustandsecurityincollaborativecomputing |