An architecture to manage security operations for digital service chains

نویسندگان

چکیده

Evolving business models are progressively pushing for increasing digitalization of existing and novel processes. The ICT industry is already addressing this need by massive introduction virtualization paradigms tight integration with the physical environment, which allow creation multi-domain complex service chains. Emerging technologies undoubtedly bring more agility in deployment operation but also break traditional security models, have not been conceived dynamic multi-tenancy environments. In paper, we briefly elaborate on gaps research challenges towards advanced assurance protection trustworthy reliable chains spanning multiple administrative domains heterogeneous infrastructures. We consolidate our analysis a reference architecture, includes all functional elements to effectively tackle agile nature emerging paradigms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Service Oriented Security Architecture

As Service Oriented Architectures (SOA) and Web services are becoming widely deployed, the problematic of security is far from being solved. In an attempt to address this issue, the industry proposed several extensions to the SOAP protocol that currently reached different levels of standardization. However, no architectural guidelines have yet been proposed. In this paper we first outline the s...

متن کامل

Architecture Approach for Mobile Service Security

Mobile computing is a relatively new field. While the challenges arising from mobility and the limitations of the portable devices are relatively well understood, there is no consensus yet as to what should be done to address these challenges. A comprehensive solution has to address many different aspects, such as the issue of dynamically changing bandwidth, the power, computational, and other ...

متن کامل

Security Model For Service-Oriented Architecture

In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is. SOA is an architectural approach which involves applications being exposed as "services". Originally, services in SOA were associated with a stack of technologies which included SOAP, WSDL, and UDDI. This article addresses th...

متن کامل

manAge: an agent architecture for manufacturing control

In this paper we introduce agent concepts to implement control algorithms and application architectures for flexible control in manufacturing. We list requirements for the implementation of the agent itself, assess existing concepts of agent architectures, and give a more detailed overview about the building blocks of an adequate agent system architecture by describing the “manAge” agent system...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Generation Computer Systems

سال: 2021

ISSN: ['0167-739X', '1872-7115']

DOI: https://doi.org/10.1016/j.future.2020.08.044