Service-Oriented Computing


Book Description

This comprehensive text explains the principles and practice of Web services and relates all concepts to practical examples and emerging standards. Its discussions include: Ontologies Semantic web technologies Peer-to-peer service discovery Service selection Web structure and link analysis Distributed transactions Process modelling Consistency management. The application of these technologies is clearly explained within the context of planning, negotiation, contracts, compliance, privacy, and network policies. The presentation of the intellectual underpinnings of Web services draws from several key disciplines such as databases, distributed computing, artificial intelligence, and multi-agent systems for techniques and formalisms. Ideas from these disciplines are united in the context of Web services and service-based applications. Featuring an accompanying website and teacher’s manual that includes a complete set of transparencies for lectures, copies of open-source software for exercises and working implementations, and resources to conduct course projects, this book makes an excellent graduate textbook. It will also prove an invaluable reference and training tool for practitioners.




Cyber Security in Parallel and Distributed Computing


Book Description

The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.




Grid Computing


Book Description

Grid research, rooted in distributed and high performance computing, started in mid-to-late 1990s. Soon afterwards, national and international research and development authorities realized the importance of the Grid and gave it a primary position on their research and development agenda. The Grid evolved from tackling data and compute-intensive problems, to addressing global-scale scientific projects, connecting businesses across the supply chain, and becoming a World Wide Grid integrated in our daily routine activities. This book tells the story of great potential, continued strength, and widespread international penetration of Grid computing. It overviews latest advances in the field and traces the evolution of selected Grid applications. The book highlights the international widespread coverage and unveils the future potential of the Grid.




Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications


Book Description

"This reference presents a vital compendium of research detailing the latest case studies, architectures, frameworks, methodologies, and research on Grid and Cloud Computing"--




Autonomic and Trusted Computing


Book Description

No fewer than 55 revised full papers are presented in this volume, all given at the 4th International Conference on Autonomic and Trusted Computing, held in Hong Kong, China in July 2007. The papers, presented together with one keynote lecture, were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on, among others, cryptography and signatures, autonomic computing and services, and secure and trusted computing.




Security for Cloud Computing


Book Description

This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure computation over remote heterogeneous cloud nodes. This book shows that present cloud computing is inherently insecure therefore advanced execution models have to be developed to prevent unauthorized users from accessing or affecting others' data and computation. The cloud approach enables on-demand scalable services that allow performing large computations without the costs and maintenance/management issues of costly server farms (thus enabling a novel kind of outsourced computing). Essential reading for software and computer engineers as well as data architects and IT professionals to better understand the complexity and heterogeneity of modern cloud- based scenarios.




Trusted Computing - Challenges and Applications


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, held in Villach, Austria, in March 2008. The 13 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 43 submissions. The papers cover the core issues of trust in IT systems and present recent leading edge developments in the field of trusted infrastructure and computing to foster the international knowledge exchange necessary to catch up with the latest trends in science and technology developments.




Information Security and Cryptology


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007. The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.







Grid Computing


Book Description

The book is an introduction to grid computing, a strategy central to IBM's plans to help organizations succeed through better sharing of resources. It includes case studies which demonstrate how organizations have success with grid computing across a variety of industries.