{"title":"分布式系统的防御和攻击更新","authors":"Subramanya.G. Bhagwath","doi":"10.54473/ijtret.2022.6105","DOIUrl":null,"url":null,"abstract":"These days, more and more People utilize the internet to access a range of services, while many businesses employ dispersed space to provide services to clients. Distributed computing systems allow the same / different computers and workstations to function as computer hotpots. In this case, operators can have similar access to local and remote resources to run processes. Users are not warned about which PCs their processes are operating on. This can create more or less complex security issues As a result, a distributed safe environment is required in which all operations and operations can be conducted securely.In distributed systems it is very important to provide the service anytime, anywhere to customers, this requires timely management of all computer and communication services, timely allocation of resources and their proper functioning. In a distributed area environmental safety is a major concern. This paper provides security reviews of distributed systems. This begins with a study of the different distributed systems in the literature. Different systems are discussed for the most recent highlights. Finally, various aspects of the safety of distributed systems and significant research tips are explored Keywords— distributed systems, security issues, grid computing","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"172 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"UPDATES ON DEFENSE AND ATTACK ON DISTRIBUTED SYSTEMS\",\"authors\":\"Subramanya.G. Bhagwath\",\"doi\":\"10.54473/ijtret.2022.6105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"These days, more and more People utilize the internet to access a range of services, while many businesses employ dispersed space to provide services to clients. Distributed computing systems allow the same / different computers and workstations to function as computer hotpots. In this case, operators can have similar access to local and remote resources to run processes. Users are not warned about which PCs their processes are operating on. This can create more or less complex security issues As a result, a distributed safe environment is required in which all operations and operations can be conducted securely.In distributed systems it is very important to provide the service anytime, anywhere to customers, this requires timely management of all computer and communication services, timely allocation of resources and their proper functioning. In a distributed area environmental safety is a major concern. This paper provides security reviews of distributed systems. This begins with a study of the different distributed systems in the literature. Different systems are discussed for the most recent highlights. Finally, various aspects of the safety of distributed systems and significant research tips are explored Keywords— distributed systems, security issues, grid computing\",\"PeriodicalId\":127327,\"journal\":{\"name\":\"International Journal Of Trendy Research In Engineering And Technology\",\"volume\":\"172 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal Of Trendy Research In Engineering And Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54473/ijtret.2022.6105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal Of Trendy Research In Engineering And Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54473/ijtret.2022.6105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
UPDATES ON DEFENSE AND ATTACK ON DISTRIBUTED SYSTEMS
These days, more and more People utilize the internet to access a range of services, while many businesses employ dispersed space to provide services to clients. Distributed computing systems allow the same / different computers and workstations to function as computer hotpots. In this case, operators can have similar access to local and remote resources to run processes. Users are not warned about which PCs their processes are operating on. This can create more or less complex security issues As a result, a distributed safe environment is required in which all operations and operations can be conducted securely.In distributed systems it is very important to provide the service anytime, anywhere to customers, this requires timely management of all computer and communication services, timely allocation of resources and their proper functioning. In a distributed area environmental safety is a major concern. This paper provides security reviews of distributed systems. This begins with a study of the different distributed systems in the literature. Different systems are discussed for the most recent highlights. Finally, various aspects of the safety of distributed systems and significant research tips are explored Keywords— distributed systems, security issues, grid computing