Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control
- Length: 192 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2020-12-31
- ISBN-10: 0367457342
- ISBN-13: 9780367457341
- Sales Rank: #0 (See Top 100 Books)
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.
The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at:
- Access control methods in cloud-enabled Internet of Things
- Secure routing algorithms for mobile ad-hoc networks
- Building security trust in mobile ad-hoc networks using soft computing methods
- The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain
- Password authentication and keystroke biometrics
- Health care data analytics over Big Data
- Bluetooth: and its open issues for managing security services in heterogenous networks
Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
Cover Half Title Title Page Copyright Page Contents Chapter 1 Access Control Methods in the Cloud-Enabled Internet of Things Chapter 2 an Intelligent Weighted Fuzzy Cluster-Based Secure Routing Algorithm for Mobile ad-hoc Networks Chapter 3 Ensuring Security through Trust in Mobile ad-hoc Networks Using Soft Computing Methods Chapter 4 Proof of Virtue: Nonce-Free Hash Generation in Blockchain Chapter 5 Password Authentication Using Keystroke Biometric Chapter 6 Healthcare Data Analytics over Big Data Chapter 7 Bluetooth: State of the Art, Taxonomy, and Open Issues for Managing Security Services in Heterogeneous Networks Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.