Security in distributed and networking systems /:
Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore ; Hackensack, NJ :
World Scientific,
©2007.
|
Schriftenreihe: | Computer and network security ;
v. 1. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy. |
Beschreibung: | 1 online resource (xvi, 493 pages) : illustrations, color portraits |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9789812770103 9812770100 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn829713529 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130311s2007 si ac ob 000 0 eng d | ||
010 | |z 2010280297 | ||
040 | |a N$T |b eng |e pn |c N$T |d IDEBK |d YDXCP |d DEBSZ |d MHW |d OKU |d OCLCQ |d AGLDB |d MERUC |d ZCU |d U3W |d OCLCF |d OCLCQ |d VTS |d ICG |d INT |d OCLCQ |d WYU |d OCLCQ |d VT2 |d STF |d OCLCQ |d DKC |d AU@ |d OCLCQ |d M8D |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d INARC |d OCLCL | ||
019 | |a 666957470 |a 851264192 |a 1066688498 |a 1081224364 |a 1228618249 |a 1412647028 | ||
020 | |a 9789812770103 |q (electronic bk.) | ||
020 | |a 9812770100 |q (electronic bk.) | ||
020 | |z 9789812708076 | ||
020 | |z 9812708073 | ||
035 | |a (OCoLC)829713529 |z (OCoLC)666957470 |z (OCoLC)851264192 |z (OCoLC)1066688498 |z (OCoLC)1081224364 |z (OCoLC)1228618249 |z (OCoLC)1412647028 | ||
050 | 4 | |a QA76.9.A25 |b S434 2007eb | |
072 | 7 | |a COM |x 046000 |2 bisacsh | |
082 | 7 | |a 005.44 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Security in distributed and networking systems / |c editors, Yang Xiao, Yi Pan. |
260 | |a Singapore ; |a Hackensack, NJ : |b World Scientific, |c ©2007. | ||
300 | |a 1 online resource (xvi, 493 pages) : |b illustrations, color portraits | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Computer and network security ; |v v. 1 | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu. | |
588 | 0 | |a Print version record. | |
520 | |a Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Distributed operating systems (Computers) |x Security measures. | |
650 | 0 | |a Electronic data processing |x Distributed processing. |0 http://id.loc.gov/authorities/subjects/sh85042293 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Systèmes d'exploitation répartis |x Sécurité |x Mesures. | |
650 | 6 | |a Traitement réparti. | |
650 | 7 | |a COMPUTERS |x Operating Systems |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Electronic data processing |x Distributed processing |2 fast | |
655 | 4 | |a Libros electronicos. | |
700 | 1 | |a Xiao, Yang, |d 1966- |1 https://id.oclc.org/worldcat/entity/E39PBJj4tyP33mkvqQ3Qt3fXh3 |0 http://id.loc.gov/authorities/names/n2007185524 | |
700 | 1 | |a Pan, Yi, |d 1960- |1 https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3 |0 http://id.loc.gov/authorities/names/n98072721 | |
758 | |i has work: |a Security in distributed and networking systems (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFC8frBBMm8pVChqqQmRgC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Security in distributed and networking systems. |d Singapore ; Hackensack, NJ : World Scientific, ©2007 |z 9789812708076 |w (DLC) 2010280297 |w (OCoLC)166373560 |
830 | 0 | |a Computer and network security ; |v v. 1. |0 http://id.loc.gov/authorities/names/no2008008076 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=518635 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH24684227 | ||
938 | |a EBSCOhost |b EBSC |n 518635 | ||
938 | |a YBP Library Services |b YANK |n 9975938 | ||
938 | |a Internet Archive |b INAR |n isbn_9789812708076 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn829713529 |
---|---|
_version_ | 1816882224683810816 |
adam_text | |
any_adam_object | |
author2 | Xiao, Yang, 1966- Pan, Yi, 1960- |
author2_role | |
author2_variant | y x yx y p yp |
author_GND | http://id.loc.gov/authorities/names/n2007185524 http://id.loc.gov/authorities/names/n98072721 |
author_facet | Xiao, Yang, 1966- Pan, Yi, 1960- |
author_sort | Xiao, Yang, 1966- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S434 2007eb |
callnumber-search | QA76.9.A25 S434 2007eb |
callnumber-sort | QA 276.9 A25 S434 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu. |
ctrlnum | (OCoLC)829713529 |
dewey-full | 005.44 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.44 |
dewey-search | 005.44 |
dewey-sort | 15.44 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06051cam a2200625 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn829713529</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130311s2007 si ac ob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2010280297</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDXCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">MHW</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">ZCU</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">666957470</subfield><subfield code="a">851264192</subfield><subfield code="a">1066688498</subfield><subfield code="a">1081224364</subfield><subfield code="a">1228618249</subfield><subfield code="a">1412647028</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812770103</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812770100</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789812708076</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9812708073</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)829713529</subfield><subfield code="z">(OCoLC)666957470</subfield><subfield code="z">(OCoLC)851264192</subfield><subfield code="z">(OCoLC)1066688498</subfield><subfield code="z">(OCoLC)1081224364</subfield><subfield code="z">(OCoLC)1228618249</subfield><subfield code="z">(OCoLC)1412647028</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S434 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">046000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.44</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Security in distributed and networking systems /</subfield><subfield code="c">editors, Yang Xiao, Yi Pan.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore ;</subfield><subfield code="a">Hackensack, NJ :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 493 pages) :</subfield><subfield code="b">illustrations, color portraits</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 1</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Distributed operating systems (Computers)</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042293</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes d'exploitation répartis</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Traitement réparti.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Libros electronicos.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiao, Yang,</subfield><subfield code="d">1966-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJj4tyP33mkvqQ3Qt3fXh3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007185524</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pan, Yi,</subfield><subfield code="d">1960-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98072721</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security in distributed and networking systems (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFC8frBBMm8pVChqqQmRgC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Security in distributed and networking systems.</subfield><subfield code="d">Singapore ; Hackensack, NJ : World Scientific, ©2007</subfield><subfield code="z">9789812708076</subfield><subfield code="w">(DLC) 2010280297</subfield><subfield code="w">(OCoLC)166373560</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 1.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008008076</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=518635</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24684227</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">518635</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9975938</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">isbn_9789812708076</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Libros electronicos. |
genre_facet | Libros electronicos. |
id | ZDB-4-EBA-ocn829713529 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:13Z |
institution | BVB |
isbn | 9789812770103 9812770100 |
language | English |
oclc_num | 829713529 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 493 pages) : illustrations, color portraits |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | World Scientific, |
record_format | marc |
series | Computer and network security ; |
series2 | Computer and network security ; |
spelling | Security in distributed and networking systems / editors, Yang Xiao, Yi Pan. Singapore ; Hackensack, NJ : World Scientific, ©2007. 1 online resource (xvi, 493 pages) : illustrations, color portraits text txt rdacontent computer c rdamedia online resource cr rdacarrier Computer and network security ; v. 1 Includes bibliographical references. Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu. Print version record. Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Distributed operating systems (Computers) Security measures. Electronic data processing Distributed processing. http://id.loc.gov/authorities/subjects/sh85042293 Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'exploitation répartis Sécurité Mesures. Traitement réparti. COMPUTERS Operating Systems General. bisacsh Computer networks Security measures fast Electronic data processing Distributed processing fast Libros electronicos. Xiao, Yang, 1966- https://id.oclc.org/worldcat/entity/E39PBJj4tyP33mkvqQ3Qt3fXh3 http://id.loc.gov/authorities/names/n2007185524 Pan, Yi, 1960- https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3 http://id.loc.gov/authorities/names/n98072721 has work: Security in distributed and networking systems (Text) https://id.oclc.org/worldcat/entity/E39PCFC8frBBMm8pVChqqQmRgC https://id.oclc.org/worldcat/ontology/hasWork Print version: Security in distributed and networking systems. Singapore ; Hackensack, NJ : World Scientific, ©2007 9789812708076 (DLC) 2010280297 (OCoLC)166373560 Computer and network security ; v. 1. http://id.loc.gov/authorities/names/no2008008076 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=518635 Volltext |
spellingShingle | Security in distributed and networking systems / Computer and network security ; Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Distributed operating systems (Computers) Security measures. Electronic data processing Distributed processing. http://id.loc.gov/authorities/subjects/sh85042293 Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'exploitation répartis Sécurité Mesures. Traitement réparti. COMPUTERS Operating Systems General. bisacsh Computer networks Security measures fast Electronic data processing Distributed processing fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85042293 |
title | Security in distributed and networking systems / |
title_auth | Security in distributed and networking systems / |
title_exact_search | Security in distributed and networking systems / |
title_full | Security in distributed and networking systems / editors, Yang Xiao, Yi Pan. |
title_fullStr | Security in distributed and networking systems / editors, Yang Xiao, Yi Pan. |
title_full_unstemmed | Security in distributed and networking systems / editors, Yang Xiao, Yi Pan. |
title_short | Security in distributed and networking systems / |
title_sort | security in distributed and networking systems |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Distributed operating systems (Computers) Security measures. Electronic data processing Distributed processing. http://id.loc.gov/authorities/subjects/sh85042293 Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'exploitation répartis Sécurité Mesures. Traitement réparti. COMPUTERS Operating Systems General. bisacsh Computer networks Security measures fast Electronic data processing Distributed processing fast |
topic_facet | Computer networks Security measures. Distributed operating systems (Computers) Security measures. Electronic data processing Distributed processing. Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'exploitation répartis Sécurité Mesures. Traitement réparti. COMPUTERS Operating Systems General. Computer networks Security measures Electronic data processing Distributed processing Libros electronicos. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=518635 |
work_keys_str_mv | AT xiaoyang securityindistributedandnetworkingsystems AT panyi securityindistributedandnetworkingsystems |