|
|
|
|
LEADER |
03335nam a22005055i 4500 |
001 |
978-3-540-44493-0 |
003 |
DE-He213 |
005 |
20151204173048.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540444930
|9 978-3-540-44493-0
|
024 |
7 |
|
|a 10.1007/978-3-540-44493-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Chakrabarti, Anirban.
|e author.
|
245 |
1 |
0 |
|a Grid Computing Security
|h [electronic resource] /
|c by Anirban Chakrabarti.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2007.
|
300 |
|
|
|a XIV, 331 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Overview of Security -- Taxonomy of Grid Security Issues -- Grid Information Security Architecture -- Grid Authorization Systems -- Service Level Security in Grid Systems -- Host Level Security -- Grid Network Security -- Grid Credential Management Systems -- Managing Trust in the Grid -- Grid Monitoring -- Putting it All Together -- Conclusion.
|
520 |
|
|
|a Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and careful implementation as grid computing offers unique security challenges. Based on his research and industry experience, Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. He discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students specializing in grid computing, networking, peer-to-peer systems, or operating systems. It can also be used as the basis for a self-contained course on grid computing security, complementing the author’s tutorials at grid conferences.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Operating Systems.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540444923
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-44493-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|