Book/Printed Material Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
About this Item
Title
- Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
Summary
- This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
Names
- Badonnel, Rémi. editor
- Koch, Robert. editor
- Stiller, Burkhard. editor
- Tuncer, Daphne. editor
Created / Published
- Cham : Springer International Publishing : Imprint: Springer, 2017.
Contents
- Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.
Headings
- - Application software
- - Computer communication systems
- - Computer security
- - Computer system failures
- - Computers and civilization
- - Data structures (Computer science)
- - Computer Communication Networks
- - Computers and Society
- - Data Structures and Information Theory
- - Information Systems Applications (incl. Internet)
- - System Performance and Evaluation
- - Systems and Data Security
Notes
- - Description based on publisher-supplied MARC data.
- - Computer Science (R0) (SpringerNature-43710)
- - Computer Science (SpringerNature-11645)
Medium
- 1 online resource (XX, 192 pages 55 illustrations)
Digital Id
Library of Congress Control Number
- 2019761901
Rights Advisory
- Creative Commons Attribution 4.0 International CC BY https://creativecommons.org/licenses/by/4.0/legalcode External
Access Advisory
- Unrestricted online access
Online Format
- image
- epub
LCCN Permalink
Additional Metadata Formats
Part of
Format
Contributor
Dates
Language
Subject
- Application Software
- Computer Communication Networks
- Computer Communication Systems
- Computer Security
- Computer System Failures
- Computers and Civilization
- Computers and Society
- Data Structures (Computer Science)
- Data Structures and Information Theory
- Information Systems Applications (Incl. Internet)
- System Performance and Evaluation
- Systems and Data Security