Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, ProceedingsDaphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. |
Other editions - View all
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6 ... Daphne Tuncer,Robert Koch,Rémi Badonnel No preview available - 2020 |
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6 ... Daphne Tuncer,Robert Koch,Rémi Badonnel No preview available - 2020 |
Common terms and phrases
4.0 International License Access This chapter algorithm allocation analysis analyze anomaly detection application approach architecture augmented graph automated backup demand blockchain chapter's Creative Commons cloud computing cloud orchestrator cloud resources communication computational nodes configuration Covert Channel Creative Commons license cyber Czech Republic DDoS attacks deployed deployment devices distributed cloud domains enforcement Ethereum evaluation flow data flow records framework Hadoop hash hybrid cloud IEEE implementation infrastructure INSALATA International Conference Internet of Things IP addresses IPv6 Lext LNCS malicious traffic master node mechanisms Mesos master module monitoring network environment Network Functions optimal packet forwarding PEPs proposed protocol requests resilient scenarios scheme security orchestrator security policy server setup smart contracts SmartDEMAP smartphone software-defined solution sub-flow Technology testbed timeslot tion TLSPs topology Tuncer tweets University of Zürich V2VUNet VANET VNF-FG VNFR XACML