cloud computing;computer network management;computer network security;software defined networking;virtualisation;Network Functions Virtualization;Software-Defined Networking;network management;Security Automation approach;automatic management tools;cloud orchestrators;virtualized network service;fully automated network security functions orchestration;optimized network security functions orchestration;automated policy-based network security management tools;human errors;suboptimal configuration;security services;automated tool;networking technologies;Security;Cloud computing;Communication networks;Resource management;Tools;Network function virtualization;Automation;network security optimization;network security orchestration;cloud security;network functions virtualization

Towards a fully automated and optimized network security functions orchestration / Bringhenti, Daniele; Marchetto, Guido; Sisto, Riccardo; Valenza, Fulvio; Yusupov, Jalolliddin. - ELETTRONICO. - (2019), pp. 1-7. ((Intervento presentato al convegno 4th IEEE International Conference on Computing, Communications and Security tenutosi a Rome, Italy nel October 2019 [10.1109/CCCS.2019.8888130].

Towards a fully automated and optimized network security functions orchestration

BRINGHENTI, DANIELE;Guido Marchetto;Riccardo Sisto;Fulvio Valenza;Jalolliddin Yusupov
2019

Abstract

cloud computing;computer network management;computer network security;software defined networking;virtualisation;Network Functions Virtualization;Software-Defined Networking;network management;Security Automation approach;automatic management tools;cloud orchestrators;virtualized network service;fully automated network security functions orchestration;optimized network security functions orchestration;automated policy-based network security management tools;human errors;suboptimal configuration;security services;automated tool;networking technologies;Security;Cloud computing;Communication networks;Resource management;Tools;Network function virtualization;Automation;network security optimization;network security orchestration;cloud security;network functions virtualization
978-1-7281-0875-9
File in questo prodotto:
File Dimensione Formato  
main.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 1.34 MB
Formato Adobe PDF
1.34 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
main-2.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 1.36 MB
Formato Adobe PDF
1.36 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Caricamento pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11583/2753692