{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:04:19Z","timestamp":1750910659987,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031973161","type":"print"},{"value":"9783031973178","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97317-8_15","type":"book-chapter","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T08:21:37Z","timestamp":1750839697000},"page":"195-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Policy Enforcement in\u00a0Cloud-Native Environments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7938-4972","authenticated-orcid":false,"given":"Pedro R.","family":"Tomas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1162-769X","authenticated-orcid":false,"given":"Sofia","family":"Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9534-6279","authenticated-orcid":false,"given":"Marco","family":"Neto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9353-0040","authenticated-orcid":false,"given":"Jorge","family":"Proen\u00e7a","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8230-4045","authenticated-orcid":false,"given":"Luis","family":"Rosa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5471-7064","authenticated-orcid":false,"given":"Luis","family":"Cordeiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1119-1239","authenticated-orcid":false,"given":"Tarik","family":"Taleb","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9278-6503","authenticated-orcid":false,"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"15_CR1","unstructured":"Agent, O.P.: Open policy agent service diagram (2025). https:\/\/www.openpolicyagent.org\/docs\/latest\/images\/opa-service.svg. Accessed 12 Mar 2025"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Budigiri, G., Baumann, C., Muhlberg, J., Truyen, E., Joosen, W.: Network policies in kubernetes: Performance evaluation and security analysis, pp. 407\u2013412 (2021). https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit51104.2021.9482526","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482526"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Budigiri, G., Baumann, C., M\u00fchlberg, J.T., Truyen, E., Joosen, W.: Network policies in kubernetes: performance evaluation and security analysis. In: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), pp. 407\u2013412 (2021). https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit51104.2021.9482526","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482526"},{"key":"15_CR4","unstructured":"Caracciolo, M.: Policy as Code, How to Automate Cloud Compliance Verification with Open-Source Tools. Ph.D. thesis, Politecnico di Torino (2024). https:\/\/webthesis.biblio.polito.it\/26908\/"},{"key":"15_CR5","unstructured":"Devoteam: Take control of your policy enforcement with open policy agent (OPA) (2025). https:\/\/www.devoteam.com\/expert-view\/take-control-of-your-policy-enforcement-with-open-policy-agent-opa\/. Accessed 07 Mar 2025"},{"key":"15_CR6","unstructured":"Devoteam: Unlocking kubernetes security and compliance with kyverno: A distributed cloud technology to consider (2025). https:\/\/www.devoteam.com\/expert-view\/unlocking-kubernetes-security-and-compliance-with-kyverno-a-distributed-cloud-technology-to-consider\/. Accessed 11 Mar 2025"},{"key":"15_CR7","unstructured":"Istio: Data plane modes in istio (2025). https:\/\/istio.io\/latest\/docs\/overview\/dataplane-modes\/. Accessed 07 Mar 2025"},{"key":"15_CR8","unstructured":"Istio: Istio architecture diagram (2025). https:\/\/istio.io\/latest\/docs\/ops\/deployment\/architecture\/. Accessed 12 Mar 2025"},{"key":"15_CR9","unstructured":"de\u00a0Jesus\u00a0Silva, J.M.: Seguran\u00e7a zero trust para microservi\u00e7os em sistemas escal\u00e1veis (2024)"},{"key":"15_CR10","unstructured":"J\u00f6sch, R.M.: Managing microservices with a service mesh: An implementation of a service mesh with kubernetes and istio (2020). Accessed 07 Mar 2025"},{"key":"15_CR11","unstructured":"Ksolves: Cilium vs. calico: A deeper look into kubernetes networking (2024). https:\/\/www.ksolves.com\/blog\/devops\/cilium-vs-calico-a-deeper-look-into-kubernetes-networking. Accessed 24 Mar 2025"},{"key":"15_CR12","unstructured":"Kuikka, S.: Kubernetes networking: Comparative insights into API gateways and service mesh implementations (2024)"},{"key":"15_CR13","unstructured":"Kyverno: Admission controllers (2023). https:\/\/kyverno.io\/docs\/introduction\/admission-controllers\/. Accessed 24 Mar 2025"},{"key":"15_CR14","unstructured":"Kyverno: Admissionreview - writing policies with jmespath (2023). https:\/\/kyverno.io\/docs\/writing-policies\/jmespath\/#admissionreview. Accessed 24 Mar 2025"},{"key":"15_CR15","unstructured":"Kyverno: How kyverno works (2023). https:\/\/kyverno.io\/docs\/introduction\/how-kyverno-works\/. Accessed 24 Mar 2025"},{"key":"15_CR16","unstructured":"Kyverno: Introduction to kyverno (2023). https:\/\/kyverno.io\/docs\/introduction\/. Accessed 24 Mar 2025"},{"key":"15_CR17","unstructured":"Luca, C.: Architecture of multi-cloud kubernetes environments (2024)"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Malviya, R., Mohammed, N.: Leveraging istio for advanced traffic management and security in generative AI applications on kubernetes cluster (2024). https:\/\/doi.org\/10.5281\/zenodo.14199369","DOI":"10.5281\/zenodo.14199369"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Mawla, T., Gupta, M., Sandhu, R.: Specification and enforcement of activity dependency policies using xacml (2024). https:\/\/arxiv.org\/abs\/2403.10092","DOI":"10.1109\/ISSSR61934.2024.00063"},{"key":"15_CR20","unstructured":"Medium: Diagram illustrating a concept (2025). https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/0*K0swBsKe9-Rlivex.png. Accessed 12 Mar 2025"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Nathaniel, L., Perdana, G.V., Hadiana, M.R., Negara, R.M., Hertiana, S.N.: Istio API gateway impact to reduce microservice latency and resource usage on kubernetes. In: 2023 International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 43\u201347 (2023). https:\/\/doi.org\/10.1109\/ISITIA59021.2023.10221035","DOI":"10.1109\/ISITIA59021.2023.10221035"},{"key":"15_CR22","unstructured":"Nirmata: Kubernetes policy comparison: Kyverno vs OPA gatekeeper (2025), https:\/\/nirmata.com\/2025\/02\/07\/kubernetes-policy-comparison-kyverno-vs-opa-gatekeeper\/. Accessed 11 Mar 2025"},{"key":"15_CR23","unstructured":"Oberoi, S.: Cilium: A comprehensive guide to networking, security, and observability in kubernetes (2025). https:\/\/medium.com\/@simardeep.oberoi\/cilium-a-comprehensive-guide-to-networking-security-and-observability-in-kubernetes-41e11fa69d15. Accessed 10 Mar 2025"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Patharlagadda, P.P.: Kubernetes traffic management using istio. J. Media Manag. 1\u20134 (2022). https:\/\/doi.org\/10.47363\/JMM\/2022(4)E101","DOI":"10.47363\/JMM\/2022(4)E101"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Paul, A., Manoj, R., S, U.: Amazon web services cloud compliance automation with open policy agent. In: 2024 International Conference on Expert Clouds and Applications (ICOECA), pp. 313\u2013317 (2024). https:\/\/doi.org\/10.1109\/ICOECA62351.2024.00063","DOI":"10.1109\/ICOECA62351.2024.00063"},{"key":"15_CR26","unstructured":"Peng, D., Cao, L., Xu, W.: Using json for data exchanging in web service applications 7 (2015)"},{"key":"15_CR27","unstructured":"Team, K.: Comparing kubernetes container network interface (CNI) providers (2025). https:\/\/kubevious.io\/blog\/post\/comparing-kubernetes-container-network-interface-cni-providers. Accessed 10 Mar 2025"},{"key":"15_CR28","doi-asserted-by":"publisher","unstructured":"Tomas, P.R., Felix, P., Rosa, L., Gomes, A.S., Cordeiro, L.: A novel approach for continual and federated network anomaly detection. In: Arai, K. (ed.) Proceedings of the Future Technologies Conference (FTC) 2024, Volume 4, pp. 212\u2013225. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-73128-0_14","DOI":"10.1007\/978-3-031-73128-0_14"},{"key":"15_CR29","unstructured":"Xgrid: Implementing kubernetes network policies with calico (2025). https:\/\/xgrid.medium.com\/implementing-kubernetes-network-policies-with-calico-83c37bb822a0. Accessed 10 Mar 2025"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations. AIAI 2025 IFIP WG 12.5 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97317-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T08:21:46Z","timestamp":1750839706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97317-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031973161","9783031973178"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97317-8_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}