|
|
|
|
LEADER |
03913nam a22005295i 4500 |
001 |
978-981-16-2670-8 |
003 |
DE-He213 |
005 |
20210726192414.0 |
007 |
cr nn 008mamaa |
008 |
210726s2021 si | s |||| 0|eng d |
020 |
|
|
|a 9789811626708
|9 978-981-16-2670-8
|
024 |
7 |
|
|a 10.1007/978-981-16-2670-8
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Li, Hui.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Co-governed Sovereignty Network
|h [electronic resource] :
|b Legal Basis and Its Prototype & Applications with MIN Architecture /
|c by Hui Li, Xin Yang.
|
250 |
|
|
|a 1st ed. 2021.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2021.
|
300 |
|
|
|a XXX, 257 p. 157 illus., 112 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1 Sovereignty and Network Sovereignty -- Chapter 2 Interpretation of Network Sovereignty.-Chapter 3 Architecture of Sovereignty Network -- Chapter 4 Key Technologies of Sovereignty Network -- Chapter 5 Prototype of Sovereignty Network and Application of Private Network based on MIN.
|
506 |
0 |
|
|a Open Access
|
520 |
|
|
|a This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the “four principles” of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer software.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050
|
650 |
2 |
4 |
|a Professional Computing.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I29000
|
700 |
1 |
|
|a Yang, Xin.
|e author.
|0 (orcid)0000-0001-6813-7677
|1 https://orcid.org/0000-0001-6813-7677
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811626692
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811626715
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811626722
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-16-2670-8
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-SOB
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|