Abstract
The goal of this chapter is to give a broad overview on recent developments in securing distributed systems. Special emphasis is put on multilateral security which equally includes the mechanical protection of systems and the guided privacy preservation for users. In the cloud age, characterised by ubiquitous connectivity but also by almost sneaky data collection and activity pattern collection, such a broad view on security is warranted to not put anybody who eventually uses such complex systems at risk more than necessary. Despite extreme caution, there will never be an absolute security, and operational or interaction mistakes may still put users at risk.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
BDSG – Bundesdatenschutzgesetz. German Federal Law; online: http://www.gesetze-im-internet.de/bdsg_1990/index.html, 1990/2009.
SET Secure Electronic Transaction. Mastercard and VISA, 1997.
SigG – Gesetz über Rahmenbedingungen für elektronische Signaturen. German Federal Law; online: http://www.gesetze-im-internet.de/sigg_2001/index.html, 2001.
Wireless Application Protocol Architecture Specification. online: http://www.wapforum.org/what/technical.htm, 2002.
Firewall classification: excITingIP. online: http://www.excitingip.com, 2015.
Steganos – Privacy software made easy. online: https://www.steganos.com/en/, 2016.
U. Black. Internet Security Protocols – Protecting IP Traffic. Prentice Hall, 2001. 304 p.
S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492, May 2006.
Gilles Brassard. Cryptography in a Quantum World. In SOFSEM, p. 3–16, 2016.
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM, 24(2):84–90, February 1981.
C. Michael Chernick, Charles Edington III, Matthew J. Fanto, and Rob Rosenthal. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations. NIST Special Publication 800-52, 2005.
George Danezis. MIX Networks with Restricted Routes. In Privacy Enhancing Technologies: Third International Workshop (PET), March 2003.
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008.
Carol Fung and Raouf Boutaba. Intrusion Detection Networks: A Key to Collaborative Security, 2013. 261 pages.
Christina Garman, Kenneth G. Paterson, and Thyla Van der Merwe. Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. In USENIX Security 2015, p. 113–128, 2015.
Adam Hils, Greg Young, and Jeremy D’Hoinne. Magic Quadrant for Enterprise Network Firewalls. Gartner, April 2015.
Bert-Jaap Koops. Crypto Law Survey. online: http://www.cryptolaw.org/, 2008/2013.
Gunter Saake Muhammad Saqib Niaz. Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data. In GvD, p. 66–71, 2015.
Maryline Laurent Nesrine Kaaniche, Ethmane El Moustaine. A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. In CCGRID, p. 522–531, 2014.
M. Pierson. Computer- und Multimediarecht. Hanser-Verlag / Taschenbuch der Informatik, 2007. esp. pp. 510–524.
M. I. P. Salas and Eliane Martins. Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security. Electr. Notes Theor. Comput. Sci. (ENTCS), 302:133–154, February 2014.
Alexander Schill and Thomas Springer. Verteilte Systeme – Grundlagen und Basistechnologien. Springer-Verlag, second edition, 2012. 433 p.; in German.
Bruce Schneier. SHA-1 Freestart Collision. online: https://www.schneier.com/blog/archives/2015/10/sha-1_freestart.html, 2015.
Martin L. Shooman. Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design. Wiley, 1st edition, 2002.
W. Stallings. Network Security Essentials. Prentice Hall, 2002. 366 p.
Jan van Eyck. The Arnolfini Wedding. The Portrait of Giovanni Arnolfini and his Wife Giovanna Cenami (The Arnolfini Marriage). http://www.wikiart.org/en/jan-van-eyck/the-arnolfini-wedding-the-portrait-of-giovanni-arnolfini-and-his-wife-giovanna-cenami-the-1434, 1434.
Andreas Westfeld. Principles of secured steganography. Doctoral dissertation, 2000.
Greg Young. Hype Cycle for Infrastructure Protection. Gartner, August 2015.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 Springer Fachmedien Wiesbaden GmbH
About this chapter
Cite this chapter
Luntovskyy, A., Spillner, J. (2017). Security in Distributed Systems. In: Architectural Transformations in Network Services and Distributed Systems. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-14842-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-658-14842-3_7
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-14840-9
Online ISBN: 978-3-658-14842-3
eBook Packages: EngineeringEngineering (R0)