Security

Security

ISBN13: 9781615207039|ISBN10: 1615207031|ISBN13 Softcover: 9781616923150|EISBN13: 9781615207046
DOI: 10.4018/978-1-61520-703-9.ch009
Cite Chapter Cite Chapter

MLA

Valentin Cristea, et al. "Security." Large-Scale Distributed Computing and Applications: Models and Trends, IGI Global, 2010, pp.194-216. https://doi.org/10.4018/978-1-61520-703-9.ch009

APA

V. Cristea, C. Dobre, C. Stratan, F. Pop , & A. Costan (2010). Security. IGI Global. https://doi.org/10.4018/978-1-61520-703-9.ch009

Chicago

Valentin Cristea, et al. "Security." In Large-Scale Distributed Computing and Applications: Models and Trends. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-703-9.ch009

Export Reference

Mendeley
Favorite

Abstract

Security in distributed systems is a combination of confidentiality, integrity and availability of their components. It mainly targets the communication channels between users and/or processes located in different computers, the access control of users / processes to resources and services, and the management of keys, users and user groups. Distributed systems are more vulnerable to security threats due to several characteristics such as their large scale, the distributed nature of the control, and the remote nature of the access. In addition, an increasing number of distributed applications (such as Internet banking) manipulate sensitive information and have special security requirements. After discussing important security concepts in the Background section, this chapter addresses several important problems that are at the aim of current research in the security of large scale distributed systems: security models (which represent the theoretical foundation for solving security problems), access control (more specific the access control in distributed multi-organizational platforms), secure communication (with emphasis on the secure group communication, which is a hot topic in security research today), security management (especially key management for collaborative environments), secure distributed architectures (which are the blueprints for designing and building security systems), and security environments / frameworks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.