Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications /: Challenges, Opportunities, and Applications. (2017)
- Record Type:
- Book
- Title:
- Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications /: Challenges, Opportunities, and Applications. (2017)
- Main Title:
- Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications
- Further Information:
- Note: Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill.
- Editors:
- Zhu, Shao Ying
Scott-Hayward, Sandra
Jacquin, Ludovic
Hill, Richard - Contents:
- Part I: Introduction to Security in SDNFV – Key Concepts Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies Doan B Hoang and Sarah Farahmandian NFV Security: Emerging Technologies and Standards Igor Faynberg and Steve Goeringer SDN and NFV Security: Challenges for Integrated Solutions Andrés F. Murillo, Sandra Julieta Rueda, Laura Victoria Morales, and Álvaro A. Cárdenas Trust in SDN/NFV Environments Antonio Lioy, Tao Su, Adrian L. Shaw, Hamza Attak, Diego R. Lopez, and Antonio Pastor Part II: SDNFV Security Challenges and Network Security Solutions Practical Experience in NFV Security Field: Virtual Home Gateway Antonio Pastor and Jesús Folgueira A Security Policy Transition Framework for Software-Defined Networks Jacob H. Cox Jr., Russell J. Clark, and Henry L. Owen III SDNFV-Based DDoS Detection and Remediation in Multi-Tenant, Virtualized Infrastructures Abeer Ali, Richard Cziva, Simon Jouët, and Dimitrios P. Pezaros SHIELD – Securing Against Intruders and Other Threats Through a NFV-Enabled Environment Hamza Attak, Marco Casassa-Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, and Eleni Trouva Part III:Security Implications of SDNFV in Future Networks Addressing Industry 4.0 Security by Software-Defined Networking Rahamatullah Khondoker, Pedro Larbig, Dirk Scheuermann,Part I: Introduction to Security in SDNFV – Key Concepts Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies Doan B Hoang and Sarah Farahmandian NFV Security: Emerging Technologies and Standards Igor Faynberg and Steve Goeringer SDN and NFV Security: Challenges for Integrated Solutions Andrés F. Murillo, Sandra Julieta Rueda, Laura Victoria Morales, and Álvaro A. Cárdenas Trust in SDN/NFV Environments Antonio Lioy, Tao Su, Adrian L. Shaw, Hamza Attak, Diego R. Lopez, and Antonio Pastor Part II: SDNFV Security Challenges and Network Security Solutions Practical Experience in NFV Security Field: Virtual Home Gateway Antonio Pastor and Jesús Folgueira A Security Policy Transition Framework for Software-Defined Networks Jacob H. Cox Jr., Russell J. Clark, and Henry L. Owen III SDNFV-Based DDoS Detection and Remediation in Multi-Tenant, Virtualized Infrastructures Abeer Ali, Richard Cziva, Simon Jouët, and Dimitrios P. Pezaros SHIELD – Securing Against Intruders and Other Threats Through a NFV-Enabled Environment Hamza Attak, Marco Casassa-Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, and Eleni Trouva Part III:Security Implications of SDNFV in Future Networks Addressing Industry 4.0 Security by Software-Defined Networking Rahamatullah Khondoker, Pedro Larbig, Dirk Scheuermann, Frank Weber, and Kpatcha Bayarou Security Requirements for Multi-Operator Virtualized Network and Service Orchestration for 5G Mateus Augusto Silva Santos, Alireza Ranjbar, Gergely Biczók, Barbara Martini, and Francesco Paolucci Improving Security in Coalition Tactical Environments Using an SDN Approach Vinod K. Mishra, Dinesh Verma, and Christopher Williams A SDN and NFV Use-Case: NDN Implementation and Security Monitoring Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, and Edgardo Montes de Oca. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2017
- Copyright Date:
- 2017
- Extent:
- 1 online resource (331 pages)
- Subjects:
- Computer science
Computers -- Security -- General
Computer security
Coding theory & cryptology
Computer Communication Networks
Computer security
Data encryption (Computer science)
Computers -- Hardware -- Network Hardware
Network hardware - Languages:
- English
- ISBNs:
- 9783319646534
- Related ISBNs:
- 9783319646527
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366079
- Ingest File:
- 01_339.xml