{"id":"https://openalex.org/W4286307887","doi":"https://doi.org/10.1109/ccgrid54584.2022.00088","title":"A cybersecurity framework to guarantee reliability and trust for digital service chains \u2013 GUARD","display_name":"A cybersecurity framework to guarantee reliability and trust for digital service chains \u2013 GUARD","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4286307887","doi":"https://doi.org/10.1109/ccgrid54584.2022.00088"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccgrid54584.2022.00088","pdf_url":null,"source":{"id":"https://openalex.org/S4363606989","display_name":"2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001542206","display_name":"Matteo Repetto","orcid":"https://orcid.org/0000-0001-8478-2633"},"institutions":[{"id":"https://openalex.org/I4210127765","display_name":"IMA (Italy)","ror":"https://ror.org/030sq7c39","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210127765"]},{"id":"https://openalex.org/I4210137033","display_name":"Istituto di Matematica Applicata e Tecnologie Informatiche","ror":"https://ror.org/03m0n3c07","country_code":"IT","type":"education","lineage":["https://openalex.org/I4210137033","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Matteo Repetto","raw_affiliation_strings":["IMATI-CNR, Genova, Italy"],"affiliations":[{"raw_affiliation_string":"IMATI-CNR, Genova, Italy","institution_ids":["https://openalex.org/I4210127765","https://openalex.org/I4210137033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001456892","display_name":"Armend Duzha","orcid":"https://orcid.org/0000-0002-4099-0091"},"institutions":[{"id":"https://openalex.org/I4210151250","display_name":"Ospedale San Raffaele Arcangelo","ror":"https://ror.org/04yaz0z51","country_code":"IT","type":"healthcare","lineage":["https://openalex.org/I4210108212","https://openalex.org/I4210151250","https://openalex.org/I4210153126"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Armend Duzha","raw_affiliation_strings":["Maggioli,Sant'Arcangelo di Romagna,Italy"],"affiliations":[{"raw_affiliation_string":"Maggioli,Sant'Arcangelo di Romagna,Italy","institution_ids":["https://openalex.org/I4210151250"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041301604","display_name":"Joanna Ko\u0142odziej","orcid":"https://orcid.org/0000-0002-5181-8713"},"institutions":[{"id":"https://openalex.org/I4210136276","display_name":"NASK National Research Institute","ror":"https://ror.org/03ajsaw82","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210136276"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Joanna Kolodziej","raw_affiliation_strings":["Research and Academic Computer Network (NASK), Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Research and Academic Computer Network (NASK), Warsaw, Poland","institution_ids":["https://openalex.org/I4210136276"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.405,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.39685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":61,"max":71},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information Security Policy Compliance and Awareness","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.70903033},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.6487113},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.504429},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.49198553},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.47439575},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.45211092},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.42564976}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73096293},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.70903033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.67096627},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.6487113},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.49198553},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.47439575},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.45211092},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4354192},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.42564976},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.4126122},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.32387275},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.30582792},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22249717},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.21070763},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19773826},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccgrid54584.2022.00088","pdf_url":null,"source":{"id":"https://openalex.org/S4363606989","display_name":"2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.63}],"grants":[{"funder":"https://openalex.org/F4320320300","funder_display_name":"European Commission","award_id":"833456"}],"datasets":[],"versions":[],"referenced_works_count":6,"referenced_works":["https://openalex.org/W2738463787","https://openalex.org/W2999529286","https://openalex.org/W3022588684","https://openalex.org/W3082735423","https://openalex.org/W3137686326","https://openalex.org/W3186205164"],"related_works":["https://openalex.org/W4312384233","https://openalex.org/W4237290840","https://openalex.org/W4221075750","https://openalex.org/W4206932869","https://openalex.org/W3183504940","https://openalex.org/W3183048213","https://openalex.org/W3114080539","https://openalex.org/W2953599647","https://openalex.org/W2225803781","https://openalex.org/W2072442316"],"abstract_inverted_index":{"Evolving":[0],"computing":[1],"paradigms":[2],"are":[3,121],"progressively":[4],"introducing":[5],"new":[6],"design,":[7],"development,":[8],"and":[9,20,44,55,68,74,78,87,105,116,132],"operation":[10,117],"models":[11],"for":[12,65,71,114],"digital":[13,99],"services,":[14,100],"which":[15,82],"increasingly":[16],"leverage":[17],"service-oriented":[18],"architectures":[19],"microservices":[21],"patterns":[22],"to":[23,110],"create":[24],"data-centric":[25],"applications.":[26],"This":[27],"approach":[28],"eventually":[29],"brings":[30],"more":[31],"agility":[32],"in":[33,98,128],"the":[34,92,129],"overall":[35],"service":[36],"lifetime":[37],"management,":[38],"but":[39],"also":[40],"introduces":[41],"additional":[42],"security":[43,96],"privacy":[45],"concerns":[46],"that":[47,101],"cannot":[48],"be":[49,103],"effectively":[50],"addressed":[51],"by":[52],"legacy":[53],"device-":[54],"infrastructure-centric":[56],"models.":[57],"The":[58],"GUARD":[59,90,119],"project":[60],"developed":[61],"an":[62],"extensible":[63],"platform":[64],"building":[66],"detection":[67],"analytics":[69],"services":[70],"advanced":[72],"assurance":[73],"protection":[75],"of":[76,94],"trustworthy":[77],"reliable":[79],"business":[80],"chains":[81],"span":[83],"multiple":[84],"administrative":[85],"domains":[86],"heterogeneous":[88],"infras-tructures.":[89],"advocates":[91],"implementation":[93],"embedded":[95],"capabilities":[97],"can":[102],"accessed":[104],"orchestrated":[106],"through":[107],"API":[108],"similar":[109],"what":[111],"already":[112],"happens":[113],"management":[115],"purposes.":[118],"features":[120],"demonstrated":[122],"on":[123],"two":[124],"challenging":[125],"use":[126],"cases,":[127],"Smart":[130],"Mobility":[131],"eHealth":[133],"domains.":[134]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4286307887","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2024-11-26T23:11:46.555029","created_date":"2022-07-21"}