{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:49:33Z","timestamp":1778604573261,"version":"3.51.4"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319646527","type":"print"},{"value":"9783319646534","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_1","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T10:33:39Z","timestamp":1510396419000},"page":"3-32","source":"Crossref","is-referenced-by-count":9,"title":["Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies"],"prefix":"10.1007","author":[{"given":"Doan B.","family":"Hoang","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Farahmandian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3844\/jcssp.2014.23.33","volume":"10","author":"H Albaroodi","year":"2014","unstructured":"Albaroodi H, Manickam S, Singh P (2014) Critical review of openstack security: issues and weaknesses. J Comp Sci 10(1):23","journal-title":"J Comp Sci"},{"key":"1_CR2","unstructured":"Alliance ODC (2013) Open data center alliance master usage model: software-defined networking rev. 2.0"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Berde P, Gerola M, Hart J, Higuchi Y, Kobayashi M, Koide T, Lantz B, O\u2019Connor B, Radoslavov P, Snow W (2014) ONOS: towards an open, distributed SDN OS. In: Proceedings of the third workshop on Hot topics in software defined networking, ACM, pp 1\u20136","DOI":"10.1145\/2620728.2620744"},{"key":"1_CR4","unstructured":"CSA (2011) Security guidance for critical areas of focus in cloud computing V3.0"},{"key":"1_CR5","unstructured":"CSA (2016) CLOUD SECURITY ALLIANCE The Treacherous 12 \u2013 Cloud Computing Top Threats"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Cui B, Xi T (2015) Security analysis of openstack keystone. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015. In: 9th international conference on, IEEE, pp 283\u2013288","DOI":"10.1109\/IMIS.2015.44"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk M, Rindos A (2015) SDSecurity: a software defined security experimental framework. In: 2015 IEEE International Conference on Communication Workshop (ICCW), 8\u201312 June 2015. pp 1871\u20131876","DOI":"10.1109\/ICCW.2015.7247453"},{"key":"1_CR8","unstructured":"ETSI G (2014) 003,\u201cNetwork Functions Virtualisation (NFV); terminology for main concepts in NFV\u201d"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Govindarajan K, Meng KC, Ong H A (2013) literature review on software-defined networking (SDN) research topics, challenges and solutions. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), IEEE, pp 293\u2013299","DOI":"10.1109\/ICoAC.2013.6921966"},{"issue":"1","key":"1_CR10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s40294-014-0005-9","volume":"2","author":"U Habiba","year":"2014","unstructured":"Habiba U, Masood R, Shibli MA, Niazi MA (2014) Cloud identity management security issues & solutions: a taxonomy. Complex Adapt Syst Model 2(1):5","journal-title":"Complex Adapt Syst Model"},{"issue":"4","key":"1_CR11","doi-asserted-by":"crossref","first-page":"48","DOI":"10.18080\/ajtde.v3n4.28","volume":"3","author":"D Hoang","year":"2015","unstructured":"Hoang D (2015) Software defined networking\u2013shaping up for the next disruptive step? Aust J Telecommun Digital Econ 3(4):48\u201362","journal-title":"Aust J Telecommun Digital Econ"},{"key":"1_CR12","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2015.10.015","volume":"58","author":"Y Jararweh","year":"2016","unstructured":"Jararweh Y, Al-Ayyoub M, Benkhelifa E, Vouk M, Rindos A (2016) Software defined cloud: survey, system and evaluation. Futur Gener Comput Syst 58:56\u201374","journal-title":"Futur Gener Comput Syst"},{"key":"1_CR13","unstructured":"Jim Metzler AMA (2016) The 2016 guide to SDN and NFV \u2013 part 4: Network Functions Virtualization (NFV) a status update"},{"key":"1_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/978-1-5225-0153-4","volume-title":"Developing interoperable and federated cloud architecture","author":"G Kecskemeti","year":"2016","unstructured":"Kecskemeti G, Kertesz A, Nemeth Z (2016) Developing interoperable and federated cloud architecture. IGI Global, Hershey, pp 1\u2013398"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Le N, Hoang D (2016) Can maturity models support cyber security? In: The IEEE international workshop on Communication, Computing, and Networking in Cyber Physical Systems (CCN-CPS)","DOI":"10.1109\/PCCC.2016.7820663"},{"key":"1_CR16","volume-title":"Cloud computing: theory and practice","author":"DC Marinescu","year":"2013","unstructured":"Marinescu DC (2013) Cloud computing: theory and practice. Morgan Kaufmann, Newnes"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud computing National Institute of Standards and Technology, Gaithersburg","DOI":"10.6028\/NIST.SP.800-145"},{"key":"1_CR18","unstructured":"Milenkoski A, Jaeger B, Raina K, Harris M, Chaudhry S, Chasiri S, David V, Liu W (2016) Security position paper network function virtualization. Cloud Security Alliance-Virtualization Working Group"},{"key":"1_CR19","unstructured":"Networks C (2014) Catbird\u00ae 6.0: private cloud security"},{"key":"1_CR20","unstructured":"Networks v (2015) vArmour distributed security system: protecting assets in the world without perimeters"},{"key":"1_CR21","unstructured":"OpenStack (2015) OpenStack-Networking Guide"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Pham M, Hoang DB (2016) SDN applications-The intent-based Northbound Interface realisation for extended applications. In: NetSoft Conference and Workshops (NetSoft), 2016 IEEE, pp 372\u2013377","DOI":"10.1109\/NETSOFT.2016.7502469"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Ranjbar A, Antikainen M, Aura T (2015) Domain isolation in a multi-tenant software-defined network. In: 2015 IEEE\/ACM 8th international conference on Utility and Cloud Computing (UCC), IEEE, pp 16\u201325","DOI":"10.1109\/UCC.2015.16"},{"key":"1_CR24","unstructured":"Ristov S, Gusev M, Donevski A (2013) Openstack cloud security vulnerabilities from inside and outside. Cloud Comp :101\u2013107"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Sahoo J, Mohapatra S, Lath R (2010) Virtualization: a survey on concepts, taxonomy and associated security issues. In: Computer and Network Technology (ICCNT), 2010 Second international conference on, IEEE, pp 222\u2013226","DOI":"10.1109\/ICCNT.2010.49"},{"key":"1_CR26","unstructured":"Schubert L, Jeffery K (2012) Advances in clouds. Report of the cloud computing expert working group, vol 1. European Commission"},{"issue":"1","key":"1_CR27","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","volume":"18","author":"S Scott-Hayward","year":"2015","unstructured":"Scott-Hayward S, Natarajan S, Sezer S (2015) A survey of security in software defined networks. IEEE Commun Surv Tutorials 18(1):623\u2013654","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1_CR28","unstructured":"SDxCentral (2017) SDN security challenges in SDN environments. https:\/\/www.sdxcentral.com\/security\/definitions\/security-challenges-sdn-software-defined-networks\/"},{"key":"1_CR29","unstructured":"Slipetskyy R (2011) Security issues in OpenStack. Master\u2019s thesis, Norwegian University of Science and Technology"},{"key":"1_CR30","volume-title":"Foundations of modern networking: SDN, NFV, QoE, IoT, and cloud","author":"W Stallings","year":"2015","unstructured":"Stallings W (2015) Foundations of modern networking: SDN, NFV, QoE, IoT, and cloud. Addison-Wesley Professional, Boston"},{"key":"1_CR31","unstructured":"Superuser O (2016) OpenStack security, piece by piece"},{"key":"1_CR32","unstructured":"Virtualization NF (2014) NFV security problem statement. ETSI NFV-SEC 1"},{"key":"1_CR33","volume-title":"A survey of isolation techniques","author":"A Viswanathan","year":"2009","unstructured":"Viswanathan A, Neuman B (2009) A survey of isolation techniques. University of Southern California, Information Sciences Institute, Los Angeles"},{"key":"1_CR34","unstructured":"VMware (2013) VMware vCloud networking and security overview"},{"key":"1_CR35","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-642-27323-0_39","volume-title":"Future wireless networks and information systems","author":"Y Xing","year":"2012","unstructured":"Xing Y, Zhan Y (2012) Virtualization and cloud computing. In: Future wireless networks and information systems. Springer, Dordrecht, pp 305\u2013312"},{"key":"1_CR36","volume-title":"Information security science-measuring the vulnerability to data compromises","author":"C Young","year":"2016","unstructured":"Young C (2016) Information security science-measuring the vulnerability to data compromises, 1st edn. Syngress Elsevier, Cambridge, MA","edition":"1"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Zhou M, Zhang R, Zeng D, Qian W (2010) Services in the cloud computing era: a survey. In: Universal Communication Symposium (IUCS), 2010 4th International, IEEE, pp 40\u201346","DOI":"10.1109\/IUCS.2010.5666772"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T02:33:39Z","timestamp":1659839619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_1","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"value":"1617-7975","type":"print"},{"value":"2197-8433","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}