Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties are emphasized. Two simple examples of such cyberspaces are given and briefly discussed.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
141--157
Opis fizyczny
Bibliogr. 27 poz., rys., tab.
Twórcy
autor
- Faculty of Electronics, Telecommunication and Informatics, Center of Informatics, Tri-city Academic Supercomputer and network, Gdańsk University of Technology, Narutowicza 11/12, 80–233 Gdańsk, Poland
Bibliografia
- [1] Curry E and Sheth A 2018 Next-Generation Smart Environments: From System of Systems to Data Ecosystemsm, Internet of Things,IEEE Intelligent Systems 33(3)28
- [2] Serpanos D 2018 The Cyber-Physical Systems Revolution, IEEE Computer Society, 51(12)70
- [3] Goodwin C F and Nicholas J P 2013 Developing a National strategy for Cyber Security,Foundation for Security Growth and Innovation
- [4] Sabillon R, Cavaller V and Cano J 2016 International Journal of Computer Science and Software Engineering (IJCSSE) 5(5)67
- [5] Caffey D Digital 2015 Business and E-Commerce Management. Strategy, Implementation and Practice, Marketing Insights Limited
- [6] Rayes A and Salam S 2017 Internet of Things – From Hype to Reality. The Road to Digitalization, Springer
- [7] Rittinghouse J W and Ransome J F 2016 Cloud Computing, Implementation, Management and Security, CRC Press
- [8] Marz N and Warren J 2018 Big Data: Principles and Best Practices of Scalable Realtime Data Systems, Maming
- [9] Manzor A, Braeken A, Liyanage M and Kanhere S S 2019 Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharingdoi: 10.1109/BLOC.2019.3751336
- [10] European Commission 2017 EU Cybersecurity Initiatives working towards a more secure online environment
- [11] Caglayan M U 2019 Some Current Cybersecurity Research in Europe,Security in Computer and Information Sciences 9
- [12] Esposito Ch, Castiglione A, Martini B and Choo K-K R 2017 Cloud Manufacturing:Security, Privacy, and Forensic Concerns, IEEE Computer Society 28
- [13] Alioto M 2017 IoT: Bird’s Eye View, Megatrends and Perspectives, Enabling the Internetof Things1
- [14] Dawoud A, Shahristani S and Raun Ch. 2018 Deep learning and software-defined networks: Towards secure IoT architecture,Internet of Things 82
- [15] Zalewski J 2019 IoT Safety: State of the Art, IEEE Computer Society
- [16] CSA Research 2019 Cloud Security, alliance.org
- [17] Wei D S L, Murugesan S, Kuo Sy-Yen, Naik K and Krizanc D 2013 Enhancing Data Integrity and Privacy in the Cloud: An Agenda, IEEE Computer Soociety 87
- [18] Addressing cloud computing security issues, Future Generation Computer Systems, Vol.28, Issue 3, pp. 583–592 Zissis D and Lekkas D 2012
- [19] Henze M, Hermerschmidt L, Kerpen D, Häußling R, Rumpe B and Wehrle K 2016 A comprehensive approach to privacy in the cloud-based Internet of Things,Future Generation Computer Systems56701
- [20] Gorton I, Greenfield P, Szalay A and Williams R 2008 Data-Intensive Computing in the 21st Century, IEEE Computer Society 30
- [21] Krawczyk H and Wielgus M 2006 Security of Web Services,Int. Conf. Dependability of Computer Systems, DepCos-Relcomex
- [22] Sampaio Jr. A R, Rubin J, Beschastnikh I and Rosa N S 2019 Journal of Internet Services and Applications10
- [23] Harjula E, Karhula P, Islam J, Leppänen T, Manzoor A, Liyanag M, Jagmohan Ch, Kumar T, Ahmad I and Ylianttila M 2019 Decentralized IoT Edge Nanoservice Architecture for Future Gadget-Free Computing,IEEE AccessXX
- [24] W3C Standards 2019, W3.org
- [25] Bertino E, Martino L, Paci F and Squicciarni A 2010 Secutity for Web Services and Service Oriented Architectures, Springer
- [26] Lubomski P and Krawczyk H 2017 IEEE Security and Privacy Magazine 1532
- [27] Krawczyk H and Lubomski P 2017 Task Quarterly 21(4)299
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2685d984-70fd-4188-8aaa-c476ce84b6b3