Security in Distributed, Grid, Mobile, and Pervasive Computing

Front Cover
CRC Press, Apr 17, 2007 - Computers - 440 pages
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
 

Contents

Part II Security in Mobile Computing
67
Part III Security in Grid Computing
203
Part IV Security in Pervasive Computing
347

Other editions - View all

Common terms and phrases

Popular passages

Page 405 - D. Estrin, R. Govindan, J. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks.
Page 405 - System Architecture Directions for Networked Sensors", in Architectural Support for Programming Languages and Operating Systems, pages 93104, 2000.
Page 405 - In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys).

About the author (2007)

Yang Xiao