Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described. Contents: Secure Group Communication (SGC); Cryptography Based Access Control; Intrusion Detection and Defence; Security in Grid Computing; Trusted and Seamless Medical Information Systems.
{"title":"Trust and Security in Collaborative Computing","authors":"X. Zou, Yuan-Shun Dai, Y. Pan","doi":"10.1142/6297","DOIUrl":"https://doi.org/10.1142/6297","url":null,"abstract":"Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described. Contents: Secure Group Communication (SGC); Cryptography Based Access Control; Intrusion Detection and Defence; Security in Grid Computing; Trusted and Seamless Medical Information Systems.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"23 1","pages":"1-248"},"PeriodicalIF":0.0,"publicationDate":"2008-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84989306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.22937/ijcsns.2022.22.4.87
O. Yuzyk, M. Yuzyk, L. Bilanych, H. Vitalii, H. Bilanych, F. Myroslava
Application of distance learning in Ukraine, the European Union (Poland), African countries, Australia, Asia, America, island countries in quarantine. Analysis of the legal and regulatory framework for the introduction of distance learning in higher education institutions in Ukraine. Application of Microsoft Office, e-learning, cloud technologies, online services in distance learning in quarantine caused by Covid-19.Author's online survey through computer networks and Google Forms of higher education students and its analysis. Online survey of research and teaching staff of the State Service for Educational Quality of Ukraine and its analysis. Opportunities for distance learning in conditions of military conflicts.
{"title":"Distance Learning in Higher Education Institutions in Conditions of Quarantine and Military Conflicts","authors":"O. Yuzyk, M. Yuzyk, L. Bilanych, H. Vitalii, H. Bilanych, F. Myroslava","doi":"10.22937/ijcsns.2022.22.4.87","DOIUrl":"https://doi.org/10.22937/ijcsns.2022.22.4.87","url":null,"abstract":"Application of distance learning in Ukraine, the European Union (Poland), African countries, Australia, Asia, America, island countries in quarantine. Analysis of the legal and regulatory framework for the introduction of distance learning in higher education institutions in Ukraine. Application of Microsoft Office, e-learning, cloud technologies, online services in distance learning in quarantine caused by Covid-19.Author's online survey through computer networks and Google Forms of higher education students and its analysis. Online survey of research and teaching staff of the State Service for Educational Quality of Ukraine and its analysis. Opportunities for distance learning in conditions of military conflicts.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68345291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}