Journals Information
Computer Science and Information Technology Vol. 3(2), pp. 49 - 53
DOI: 10.13189/csit.2015.030203
Reprint (PDF) (414Kb)
Security Techniques in Distributed Systems
Reza Nayebi Shahabi *
Tabriz, I.R. Iran
ABSTRACT
The security of information systems is the most important principle that can also be said that the most difficult, because security must be maintained throughout the system. At the beginning of this article we are going to introduce basic principles of security. The securities of distributed systems are divided into two parts: A portion of the communication between users and processes is concerned with examining issues such as authentication, message integrity and encryption will be discussed. In the next section, we will examine the guaranteed access permissions to resources in distributed systems. In addition to traditional access solutions, access control in mobile codes will be examined.
KEYWORDS
Security, Digital Signatures, Access Control, Authentication
Cite This Paper in IEEE or APA Citation Styles
(a). IEEE Format:
[1] Reza Nayebi Shahabi , "Security Techniques in Distributed Systems," Computer Science and Information Technology, Vol. 3, No. 2, pp. 49 - 53, 2015. DOI: 10.13189/csit.2015.030203.
(b). APA Format:
Reza Nayebi Shahabi (2015). Security Techniques in Distributed Systems. Computer Science and Information Technology, 3(2), 49 - 53. DOI: 10.13189/csit.2015.030203.