Security Issues in Distributed Computing System Models

Security Issues in Distributed Computing System Models

Ghada Farouk Elkabbany, Mohamed Rasslan
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch022
Cite Chapter Cite Chapter

MLA

Elkabbany, Ghada Farouk, and Mohamed Rasslan. "Security Issues in Distributed Computing System Models." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 381-418. https://doi.org/10.4018/978-1-5225-5634-3.ch022

APA

Elkabbany, G. F. & Rasslan, M. (2018). Security Issues in Distributed Computing System Models. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 381-418). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch022

Chicago

Elkabbany, Ghada Farouk, and Mohamed Rasslan. "Security Issues in Distributed Computing System Models." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 381-418. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch022

Export Reference

Mendeley
Favorite

Abstract

Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.