PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Service-oriented cyberspace for improving cybersecurity

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties are emphasized. Two simple examples of such cyberspaces are given and briefly discussed.
Rocznik
Strony
141--157
Opis fizyczny
Bibliogr. 27 poz., rys., tab.
Twórcy
  • Faculty of Electronics, Telecommunication and Informatics, Center of Informatics, Tri-city Academic Supercomputer and network, Gdańsk University of Technology, Narutowicza 11/12, 80–233 Gdańsk, Poland
Bibliografia
  • [1] Curry E and Sheth A 2018 Next-Generation Smart Environments: From System of Systems to Data Ecosystemsm, Internet of Things,IEEE Intelligent Systems 33(3)28
  • [2] Serpanos D 2018 The Cyber-Physical Systems Revolution, IEEE Computer Society, 51(12)70
  • [3] Goodwin C F and Nicholas J P 2013 Developing a National strategy for Cyber Security,Foundation for Security Growth and Innovation
  • [4] Sabillon R, Cavaller V and Cano J 2016 International Journal of Computer Science and Software Engineering (IJCSSE) 5(5)67
  • [5] Caffey D Digital 2015 Business and E-Commerce Management. Strategy, Implementation and Practice, Marketing Insights Limited
  • [6] Rayes A and Salam S 2017 Internet of Things – From Hype to Reality. The Road to Digitalization, Springer
  • [7] Rittinghouse J W and Ransome J F 2016 Cloud Computing, Implementation, Management and Security, CRC Press
  • [8] Marz N and Warren J 2018 Big Data: Principles and Best Practices of Scalable Realtime Data Systems, Maming
  • [9] Manzor A, Braeken A, Liyanage M and Kanhere S S 2019 Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharingdoi: 10.1109/BLOC.2019.3751336
  • [10] European Commission 2017 EU Cybersecurity Initiatives working towards a more secure online environment
  • [11] Caglayan M U 2019 Some Current Cybersecurity Research in Europe,Security in Computer and Information Sciences 9
  • [12] Esposito Ch, Castiglione A, Martini B and Choo K-K R 2017 Cloud Manufacturing:Security, Privacy, and Forensic Concerns, IEEE Computer Society 28
  • [13] Alioto M 2017 IoT: Bird’s Eye View, Megatrends and Perspectives, Enabling the Internetof Things1
  • [14] Dawoud A, Shahristani S and Raun Ch. 2018 Deep learning and software-defined networks: Towards secure IoT architecture,Internet of Things 82
  • [15] Zalewski J 2019 IoT Safety: State of the Art, IEEE Computer Society
  • [16] CSA Research 2019 Cloud Security, alliance.org
  • [17] Wei D S L, Murugesan S, Kuo Sy-Yen, Naik K and Krizanc D 2013 Enhancing Data Integrity and Privacy in the Cloud: An Agenda, IEEE Computer Soociety 87
  • [18] Addressing cloud computing security issues, Future Generation Computer Systems, Vol.28, Issue 3, pp. 583–592 Zissis D and Lekkas D 2012
  • [19] Henze M, Hermerschmidt L, Kerpen D, Häußling R, Rumpe B and Wehrle K 2016 A comprehensive approach to privacy in the cloud-based Internet of Things,Future Generation Computer Systems56701
  • [20] Gorton I, Greenfield P, Szalay A and Williams R 2008 Data-Intensive Computing in the 21st Century, IEEE Computer Society 30
  • [21] Krawczyk H and Wielgus M 2006 Security of Web Services,Int. Conf. Dependability of Computer Systems, DepCos-Relcomex
  • [22] Sampaio Jr. A R, Rubin J, Beschastnikh I and Rosa N S 2019 Journal of Internet Services and Applications10
  • [23] Harjula E, Karhula P, Islam J, Leppänen T, Manzoor A, Liyanag M, Jagmohan Ch, Kumar T, Ahmad I and Ylianttila M 2019 Decentralized IoT Edge Nanoservice Architecture for Future Gadget-Free Computing,IEEE AccessXX
  • [24] W3C Standards 2019, W3.org
  • [25] Bertino E, Martino L, Paci F and Squicciarni A 2010 Secutity for Web Services and Service Oriented Architectures, Springer
  • [26] Lubomski P and Krawczyk H 2017 IEEE Security and Privacy Magazine 1532
  • [27] Krawczyk H and Lubomski P 2017 Task Quarterly 21(4)299
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2685d984-70fd-4188-8aaa-c476ce84b6b3
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.