Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

Grid Computing Security

By: Chakrabarti, Anirban [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookPublisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.Description: XIV, 331 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540444930.Subject(s): Computer science | Computer communication systems | Operating systems (Computers) | Computer security | Management information systems | Electrical engineering | Computer Science | Computer Communication Networks | Systems and Data Security | Management of Computing and Information Systems | Communications Engineering, Networks | Operating SystemsDDC classification: 004.6 Online resources: Click here to access online
Contents:
Overview of Security -- Taxonomy of Grid Security Issues -- Grid Information Security Architecture -- Grid Authorization Systems -- Service Level Security in Grid Systems -- Host Level Security -- Grid Network Security -- Grid Credential Management Systems -- Managing Trust in the Grid -- Grid Monitoring -- Putting it All Together -- Conclusion.
In: Springer eBooksSummary: Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and careful implementation as grid computing offers unique security challenges. Based on his research and industry experience, Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. He discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students specializing in grid computing, networking, peer-to-peer systems, or operating systems. It can also be used as the basis for a self-contained course on grid computing security, complementing the author’s tutorials at grid conferences.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
E books E books PK Kelkar Library, IIT Kanpur
Available EBK1538
Total holds: 0

Overview of Security -- Taxonomy of Grid Security Issues -- Grid Information Security Architecture -- Grid Authorization Systems -- Service Level Security in Grid Systems -- Host Level Security -- Grid Network Security -- Grid Credential Management Systems -- Managing Trust in the Grid -- Grid Monitoring -- Putting it All Together -- Conclusion.

Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and careful implementation as grid computing offers unique security challenges. Based on his research and industry experience, Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. He discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students specializing in grid computing, networking, peer-to-peer systems, or operating systems. It can also be used as the basis for a self-contained course on grid computing security, complementing the author’s tutorials at grid conferences.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha