Abstract
This paper will describe the most important aspects of cybersecurity systems oriented for distributed communication as well as dispersed computation. Especially the most important ways how to guarantee the highest level of security will be describes, and issues how to prevent cyberattacks. Especially human factors which have influence for general security levels also will be considered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Bichindaritz, I., Vaidya, S., Jain, A., Jain, L.C. (eds.) Computational Intelligence in Healthcare 4. Studies in Computational Intelligence, vol. 309, pp. 347–369. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14464-6_16
Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS 2015, pp. 179–183 (2015). https://doi.org/10.1109/IMIS.2015.29
Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) Complex, Intelligent, and Software Intensive Systems. Advances in Intelligent Systems and Computing, vol. 611, pp. 82–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61566-0_8
Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)
Ogiela, L.: Transformative computing in advanced data analysis processes in the cloud. Inf. Process. Manage. 57(5), 102260 (2020)
Gil, S., et al.: Transformative effects of IoT, Blockchain and artificial intelligence on cloud computing: evolution, vision, trends and open challenges. Internet Things 8, 100118 (2019)
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol. 244, pp. 327–336. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03958-4_28
Ogiela, L.: Data management in cognitive financial systems. Int. J. Inf. Manage. 33(2), 263–270 (2013). https://doi.org/10.1016/j.ijinfomgt.2012.11.008
Ogiela, M.R., Ogiela, U., Ogiela, L.: Secure information sharing using personal biometric characteristics. In: Kim, T.-H., Kang, J.-J., Grosky, W.I., Arslan, T., Pissinou, N. (eds.) FGIT 2012. CCIS, vol. 353, pp. 369–373. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35521-9_54
Acknowledgments
Research project supported by program “Excellence initiative – research university” for the AGH University of Science and Technology. This work has been supported by the funds of the Polish Ministry of Education and Science assigned to AGH University of Science and Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, U., Takizawa, M., Ogiela, L. (2023). Cybersecurity of Distributed Systems and Dispersed Computing. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 654. Springer, Cham. https://doi.org/10.1007/978-3-031-28451-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-031-28451-9_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28450-2
Online ISBN: 978-3-031-28451-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)