Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynam...

Full description

Saved in:
Bibliographic Details
Other Authors: Kołodziej, Joanna (Editor), Repetto, Matteo (Editor), Duzha, Armend (Editor)
Format: Electronic Book Chapter
Language:English
Published: Cham Springer Nature 2022
Series:Lecture Notes in Computer Science
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_81287
005 20220512
003 oapen
006 m o d
007 cr|mn|---annan
008 20220512s2022 xx |||||o ||| 0|eng d
020 |a 978-3-031-04036-8 
020 |a 9783031040368 
040 |a oapen  |c oapen 
024 7 |a 10.1007/978-3-031-04036-8  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UKN  |2 bicssc 
072 7 |a UBL  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a UNH  |2 bicssc 
100 1 |a Kołodziej, Joanna  |4 edt 
700 1 |a Repetto, Matteo  |4 edt 
700 1 |a Duzha, Armend  |4 edt 
700 1 |a Kołodziej, Joanna  |4 oth 
700 1 |a Repetto, Matteo  |4 oth 
700 1 |a Duzha, Armend  |4 oth 
245 1 0 |a Cybersecurity of Digital Service Chains  |b Challenges, Methodologies, and Tools 
260 |a Cham  |b Springer Nature  |c 2022 
300 |a 1 electronic resource (257 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. 
540 |a Creative Commons  |f by/4.0/  |2 cc  |4 http://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Network hardware  |2 bicssc 
650 7 |a Legal aspects of IT  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
650 7 |a Information retrieval  |2 bicssc 
653 |a cloud computing 
653 |a computer crime 
653 |a computer networks 
653 |a computer security 
653 |a cryptography 
653 |a cyber security 
653 |a data communication systems 
653 |a data flow architectures 
653 |a data management systems 
653 |a data security 
653 |a electromagnetic interference and compatibility 
653 |a general programming languages 
653 |a health informatics 
653 |a intrusion detection 
653 |a network protocols 
653 |a network security 
653 |a network simulations 
653 |a sensors and actuators 
653 |a signal processing 
653 |a telecommunication traffic 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/54033/1/978-3-031-04036-8.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/81287  |7 0  |z DOAB: description of the publication