Useful Links
Computer Science
Distributed Systems
Distributed Systems
1. Introduction to Distributed Systems
2. System Models and Architectures
3. Inter-Process Communication
4. Time and Global States
5. Coordination and Agreement
6. Consensus and Related Problems
7. Fault Tolerance and Reliability
8. Replication and Consistency
9. Distributed Data Storage
10. Distributed Transactions
11. Security in Distributed Systems
12. Modern Paradigms and Applications
Security in Distributed Systems
Security Fundamentals
Security Goals
Confidentiality
Integrity
Availability
Authentication
Authorization
Non-repudiation
Threat Models
Passive Attacks
Active Attacks
Insider Threats
Security Challenges
Network Security
Endpoint Security
Data Security
Cryptographic Foundations
Symmetric Cryptography
Block Ciphers
Stream Ciphers
Key Management
Asymmetric Cryptography
Public Key Systems
Digital Signatures
Key Exchange
Hash Functions
Cryptographic Hash Properties
Message Authentication Codes
Digital Fingerprints
Secure Communication
Secure Channels
Channel Security Properties
End-to-End Security
Hop-by-Hop Security
Transport Layer Security
TLS Protocol
Handshake Protocol
Record Protocol
Certificate Management
Secure Messaging
Message Encryption
Message Authentication
Message Integrity
Authentication and Authorization
Authentication Mechanisms
Password-Based Authentication
Certificate-Based Authentication
Biometric Authentication
Multi-Factor Authentication
Authentication Protocols
Challenge-Response Protocols
Zero-Knowledge Protocols
Single Sign-On
Authorization Models
Access Control Lists
Capability-Based Systems
Role-Based Access Control
Attribute-Based Access Control
Key Management
Key Distribution
Key Distribution Centers
Public Key Infrastructure
Key Agreement Protocols
Key Management Protocols
Needham-Schroeder Protocol
Kerberos Protocol
Diffie-Hellman Key Exchange
Certificate Management
Certificate Authorities
Certificate Revocation
Trust Models
Secure Group Communication
Group Key Management
Centralized Key Distribution
Distributed Key Agreement
Key Trees
Secure Multicast
Group Authentication
Message Integrity
Forward Secrecy
Backward Secrecy
Previous
10. Distributed Transactions
Go to top
Next
12. Modern Paradigms and Applications