Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

CHAPTER 14SECURITY IN DISTRIBUTED OPERATING SYSTEM: A COMPREHENSIVE STUDY

Sushree Bibhuprada B. Priyadarshini1, Amiya Bhusan Bagjadab2, Brojo Kishore Mishra3

1 Institute of Technical Education and Research, Bhubaneswar, India.

2 Sambalpur University of Information Technology, Burla, India

3 C. V. Raman College of Engineering, Bhubaneswar, India

Email: bimalabibhuprada@gmail.com, amiya7bhusan7@gmail.com, brojokishoremishra@gmail.com

Abstract

In recent years, various attacks have increasingly been making their way into the world of information. In this context, security in distributed operating systems is poised to become a crucial element. However, currently entirely new information markets have opened up as playing fields for a number of computer criminals, and therefore it is still the job of the user to protect the data. In the current chapter, we shed light upon security policies, security mechanisms, various categories of attacks such as denial-of-service attacks, Globus security architecture, along with distribution of security mechanisms. Furthermore, we have also investigated the various strategies of attack that occur frequently in any information system under consideration.

Keywords: Access control, cryptography, denial-of-service, distributed operating system, fabrication, threat

14.1 Introduction to Security and Distributed Systems

The phrase “Operating system security” is basically the process of ensuring the integrity, confidentiality as well as availability of ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book