Affiliation:
1. Electronics Research Institute, Egypt
Abstract
Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.
Reference82 articles.
1. A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
2. Single password authentication
3. Security in cloud computing: Opportunities and challenges
4. Using fingerprint recognition in a new security model for accessing distributed systems.;S.Alotaibi;International Journal of Intelligent Computing Research,2010
5. Security issues with possible solutions in cloud computing- A survey.;A.Angadi;International Journal of Advanced Research in Computer Engineering and Technology,2013