Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynam...
Saved in:
Other Authors: | , , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Cham
Springer Nature
2022
|
Series: | Lecture Notes in Computer Science
13300 |
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_54033 | ||
005 | 20220413 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20220413s2022 xx |||||o ||| 0|eng d | ||
020 | |a 978-3-031-04036-8 | ||
020 | |a 9783031040368 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1007/978-3-031-04036-8 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UKN |2 bicssc | |
072 | 7 | |a UBL |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UNH |2 bicssc | |
100 | 1 | |a Kołodziej, Joanna |4 edt | |
700 | 1 | |a Repetto, Matteo |4 edt | |
700 | 1 | |a Duzha, Armend |4 edt | |
700 | 1 | |a Kołodziej, Joanna |4 oth | |
700 | 1 | |a Repetto, Matteo |4 oth | |
700 | 1 | |a Duzha, Armend |4 oth | |
245 | 1 | 0 | |a Cybersecurity of Digital Service Chains |b Challenges, Methodologies, and Tools |
260 | |a Cham |b Springer Nature |c 2022 | ||
300 | |a 1 electronic resource (257 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 13300 | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. | ||
540 | |a Creative Commons |f by/4.0/ |2 cc |4 http://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Network hardware |2 bicssc | |
650 | 7 | |a Legal aspects of IT |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
650 | 7 | |a Information retrieval |2 bicssc | |
653 | |a cloud computing | ||
653 | |a computer crime | ||
653 | |a computer networks | ||
653 | |a computer security | ||
653 | |a cryptography | ||
653 | |a cyber security | ||
653 | |a data communication systems | ||
653 | |a data flow architectures | ||
653 | |a data management systems | ||
653 | |a data security | ||
653 | |a electromagnetic interference and compatibility | ||
653 | |a general programming languages | ||
653 | |a health informatics | ||
653 | |a intrusion detection | ||
653 | |a network protocols | ||
653 | |a network security | ||
653 | |a network simulations | ||
653 | |a sensors and actuators | ||
653 | |a signal processing | ||
653 | |a telecommunication traffic | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/7cc6977b-b50e-4961-89a0-e314a14c09c2/978-3-031-04036-8.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/54033 |7 0 |z OAPEN Library: description of the publication |