Conference paper Restricted Access
Bensalem, Mounir; Dizdarevic, Jasenka; Carpio, Francisco; Jukan, Admela
{ "owners": [ 47778 ], "doi": "10.1109/HPSR52026.2021.9481801", "stats": { "version_unique_downloads": 7.0, "unique_views": 45.0, "views": 56.0, "version_views": 56.0, "unique_downloads": 7.0, "version_unique_views": 45.0, "volume": 15255240.0, "version_downloads": 9.0, "downloads": 9.0, "version_volume": 15255240.0 }, "links": { "latest_html": "https://zenodo.org/record/5680311", "doi": "https://doi.org/10.1109/HPSR52026.2021.9481801", "badge": "https://zenodo.org/badge/doi/10.1109/HPSR52026.2021.9481801.svg", "html": "https://zenodo.org/record/5680311", "latest": "https://zenodo.org/api/records/5680311" }, "created": "2021-11-12T11:07:38.222718+00:00", "updated": "2022-03-24T14:13:15.405655+00:00", "conceptrecid": "5680310", "revision": 6, "id": 5680311, "metadata": { "access_right_category": "danger", "doi": "10.1109/HPSR52026.2021.9481801", "description": "<p>The evolution towards Industry 4.0 is driving the need for innovative solutions in the area of network management, considering the complex, dynamic and heterogeneous nature of ICT supply chains. To this end, Intent-Based networking (IBN) which is already proven to evolve how network management is driven today, can be implemented as a solution to facilitate the management of large ICT supply chains. In this paper, we first present a comparison of the main architectural components of typical IBN systems and, then, we study the key engineering requirements when integrating IBN with ICT supply chain network systems while considering AI methods. We also propose a general architecture design that enables intent translation of ICT supply chain specifications into lower level policies, to finally show an example of how the access control is performed in a modeled ICT supply chain system.</p>", "language": "eng", "title": "The Role of Intent-Based Networking in ICT Supply Chains", "relations": { "version": [ { "count": 1, "index": 0, "parent": { "pid_type": "recid", "pid_value": "5680310" }, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "5680311" } } ] }, "access_conditions": "<p>Copyrights are by IEEE.</p>", "grants": [ { "code": "952644", "links": { "self": "https://zenodo.org/api/grants/10.13039/501100000780::952644" }, "title": "A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures", "acronym": "FISHY", "program": "H2020", "funder": { "doi": "10.13039/501100000780", "acronyms": [], "name": "European Commission", "links": { "self": "https://zenodo.org/api/funders/10.13039/501100000780" } } } ], "communities": [ { "id": "fishy" } ], "publication_date": "2021-07-15", "creators": [ { "affiliation": "Technische Universit\u00e4t Braunschweig", "name": "Bensalem, Mounir" }, { "affiliation": "Technische Universit\u00e4t Braunschweig", "name": "Dizdarevic, Jasenka" }, { "affiliation": "Technische Universit\u00e4t Braunschweig", "name": "Carpio, Francisco" }, { "affiliation": "Technische Universit\u00e4t Braunschweig", "name": "Jukan, Admela" } ], "access_right": "restricted", "resource_type": { "subtype": "conferencepaper", "type": "publication", "title": "Conference paper" } } }
Views | 56 |
Downloads | 9 |
Data volume | 15.3 MB |
Unique views | 45 |
Unique downloads | 7 |