找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data-Centric Security in Software Defined Networks (SDN); Marek Amanowicz,Sebastian Szwaczyk,Konrad Wrona Book 2024 The Editor(s) (if appl

[复制链接]
查看: 23385|回复: 39
发表于 2025-3-21 18:12:01 | 显示全部楼层 |阅读模式
书目名称Data-Centric Security in Software Defined Networks (SDN)
编辑Marek Amanowicz,Sebastian Szwaczyk,Konrad Wrona
视频video
概述Presents recent research on Data-Centric Security in Software-Defined Networks.Provides insights in the nature and capabilities of implementing DCS in programmable networks.Aims at readers familiar wi
丛书名称Studies in Big Data
图书封面Titlebook: Data-Centric Security in Software Defined Networks (SDN);  Marek Amanowicz,Sebastian Szwaczyk,Konrad Wrona Book 2024 The Editor(s) (if appl
描述.The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aimto provide defence under the assumption that the boundary protections will be breached. .Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to  integrating the DCS concept with SDN. They introduce
出版日期Book 2024
关键词Big Data; Data-Centric Security; Software Defined Networks; SDN; Data Security in SDN; Artificial Intelli
版次1
doihttps://doi.org/10.1007/978-3-031-55517-6
isbn_softcover978-3-031-55519-0
isbn_ebook978-3-031-55517-6Series ISSN 2197-6503 Series E-ISSN 2197-6511
issn_series 2197-6503
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Data-Centric Security in Software Defined Networks (SDN)影响因子(影响力)




书目名称Data-Centric Security in Software Defined Networks (SDN)影响因子(影响力)学科排名




书目名称Data-Centric Security in Software Defined Networks (SDN)网络公开度




书目名称Data-Centric Security in Software Defined Networks (SDN)网络公开度学科排名




书目名称Data-Centric Security in Software Defined Networks (SDN)被引频次




书目名称Data-Centric Security in Software Defined Networks (SDN)被引频次学科排名




书目名称Data-Centric Security in Software Defined Networks (SDN)年度引用




书目名称Data-Centric Security in Software Defined Networks (SDN)年度引用学科排名




书目名称Data-Centric Security in Software Defined Networks (SDN)读者反馈




书目名称Data-Centric Security in Software Defined Networks (SDN)读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:11:33 | 显示全部楼层
发表于 2025-3-22 03:42:25 | 显示全部楼层
Data-Centric Security in Software Defined Networks (SDN)
发表于 2025-3-22 05:45:27 | 显示全部楼层
Software Defined Networks,h an approach is a complicated and inflexible management process that introduces great difficulty in creating and implementing new network solutions. The administrator must configure each device separately to achieve the desired network operation.
发表于 2025-3-22 09:47:06 | 显示全部楼层
发表于 2025-3-22 13:58:48 | 显示全部楼层
Risk-Aware Routing in SDN,t operational scenarios usually require finding the appropriate balance between ensuring confidentiality and availability of specific resource or service to users. The cost of potential unauthorized disclosure must be balanced with the cost of inability to perform operations or performing them based
发表于 2025-3-22 20:41:25 | 显示全部楼层
,DCS Deployment in SDN-Based Systems,n does not answer all the questions related to the design and implementation of a practical DCS solution. Some additional challenges that are not discussed in detail are, for example, related to integrating DCS with existing cyber defence infrastructure and procedures. For example, acquiring current
发表于 2025-3-23 01:06:49 | 显示全部楼层
Data-Centric Security in Software Defined Networks (SDN)978-3-031-55517-6Series ISSN 2197-6503 Series E-ISSN 2197-6511
发表于 2025-3-23 03:29:13 | 显示全部楼层
Tim Blackwell,Oliver Bown,Michael Youngh an approach is a complicated and inflexible management process that introduces great difficulty in creating and implementing new network solutions. The administrator must configure each device separately to achieve the desired network operation.
发表于 2025-3-23 09:36:38 | 显示全部楼层
Tim Blackwell,Oliver Bown,Michael Young control of access to information. Such a new approach must not only support enforcement of need-to-know and responsibility-to-share requirements, but also enable defence-in-depth through cross-layer enforcement of security policies.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-11 08:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表