An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains

作者: Domenico Striccoli , Giuseppe Piro , Alessandro Carrega , Gennaro Boggia , Raffaele Bolla

DOI: 10.1007/S10922-021-09607-7

关键词:

摘要:

参考文章(44)
Dharavath Ramesh, Rashmi Priya, Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage international conference on microelectronics computing and communications. pp. 1- 4 ,(2016) , 10.1109/MICROCOM.2016.7522518
Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst, Intrusion Prediction Systems Springer, Cham. pp. 155- 174 ,(2017) , 10.1007/978-3-319-44257-0_7
Jianghong Wei, Wenfen Liu, Xuexian Hu, Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage IEEE Systems Journal. ,vol. 12, pp. 1731- 1742 ,(2018) , 10.1109/JSYST.2016.2633559
Ruixuan Li, Chenglin Shen, Heng He, Xiwu Gu, Zhiyong Xu, Cheng-Zhong Xu, A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing IEEE Transactions on Cloud Computing. ,vol. 6, pp. 344- 357 ,(2018) , 10.1109/TCC.2017.2649685
Bo Lang, Jinmiao Wang, Yanxi Liu, Achieving Flexible and Self-Contained Data Protection in Cloud Computing IEEE Access. ,vol. 5, pp. 1510- 1523 ,(2017) , 10.1109/ACCESS.2017.2665586
Niels Bouten, Rashid Mijumbi, Joan Serrat, Jeroen Famaey, Steven Latre, Filip De Turck, Semantically Enhanced Mapping Algorithm for Affinity-Constrained Service Function Chain Requests IEEE Transactions on Network and Service Management. ,vol. 14, pp. 317- 331 ,(2017) , 10.1109/TNSM.2017.2681025
Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao, A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications IEEE Internet of Things Journal. ,vol. 4, pp. 1125- 1142 ,(2017) , 10.1109/JIOT.2017.2683200
Adeel Ahmed Khan, Mohsin Khan, Waseem Ahmed, Improved scheduling of virtual machines on cloud with multi-tenancy and resource heterogeneity international conference on automatic control and dynamic optimization techniques. ,vol. 2016, pp. 815- 819 ,(2016) , 10.1109/ICACDOT.2016.7877700
S Hares, D Lopez, M Zarny, C Jacquenet, R Kumar, J Jeong, None, Interface to Network Security Functions (I2NSF): Problem Statement and Use Cases RFC. ,vol. 8192, pp. 1- 29 ,(2017)
Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz, Automated verification of security chains in software-defined networks with synaptic ieee conference on network softwarization. pp. 1- 9 ,(2017) , 10.1109/NETSOFT.2017.8004195