Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynam...
Сохранить в:
Другие авторы: | , , |
---|---|
Формат: | Электронный ресурс Глава книги |
Язык: | английский |
Опубликовано: |
Cham
Springer Nature
2022
|
Серии: | Lecture Notes in Computer Science
13300 |
Предметы: | |
Online-ссылка: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_54033 | ||
005 | 20220413 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20220413s2022 xx |||||o ||| 0|eng d | ||
020 | |a 978-3-031-04036-8 | ||
020 | |a 9783031040368 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1007/978-3-031-04036-8 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UKN |2 bicssc | |
072 | 7 | |a UBL |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UNH |2 bicssc | |
100 | 1 | |a Kołodziej, Joanna |4 edt | |
700 | 1 | |a Repetto, Matteo |4 edt | |
700 | 1 | |a Duzha, Armend |4 edt | |
700 | 1 | |a Kołodziej, Joanna |4 oth | |
700 | 1 | |a Repetto, Matteo |4 oth | |
700 | 1 | |a Duzha, Armend |4 oth | |
245 | 1 | 0 | |a Cybersecurity of Digital Service Chains |b Challenges, Methodologies, and Tools |
260 | |a Cham |b Springer Nature |c 2022 | ||
300 | |a 1 electronic resource (257 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 13300 | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. | ||
540 | |a Creative Commons |f by/4.0/ |2 cc |4 http://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Network hardware |2 bicssc | |
650 | 7 | |a Legal aspects of IT |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
650 | 7 | |a Information retrieval |2 bicssc | |
653 | |a cloud computing | ||
653 | |a computer crime | ||
653 | |a computer networks | ||
653 | |a computer security | ||
653 | |a cryptography | ||
653 | |a cyber security | ||
653 | |a data communication systems | ||
653 | |a data flow architectures | ||
653 | |a data management systems | ||
653 | |a data security | ||
653 | |a electromagnetic interference and compatibility | ||
653 | |a general programming languages | ||
653 | |a health informatics | ||
653 | |a intrusion detection | ||
653 | |a network protocols | ||
653 | |a network security | ||
653 | |a network simulations | ||
653 | |a sensors and actuators | ||
653 | |a signal processing | ||
653 | |a telecommunication traffic | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/7cc6977b-b50e-4961-89a0-e314a14c09c2/978-3-031-04036-8.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/54033 |7 0 |z OAPEN Library: description of the publication |