{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:23:29Z","timestamp":1751091809914,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_10","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"253-272","source":"Crossref","is-referenced-by-count":6,"title":["Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G"],"prefix":"10.1007","author":[{"given":"Mateus Augusto Silva","family":"Santos","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Ranjbar","sequence":"additional","affiliation":[]},{"given":"Gergely","family":"Bicz\u00f3k","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Martini","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Paolucci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"10_CR1","unstructured":"5GEx EU H2020-ICT-2014-2, \nhttp:\/\/www.5gex.eu\/\n\n. Accessed 01 Dec 2016"},{"key":"10_CR2","unstructured":"5G White Paper, NGMN Alliance (2015). \nhttps:\/\/www.ngmn.org\/uploads\/media\/NGMN_5G_White_Paper_V1_0.pdf\n\n. Accessed 5 Apr 2017"},{"key":"10_CR3","unstructured":"5G Systems, Ericsson White Paper (2017). \nhttps:\/\/www.ericsson.com\/res\/docs\/whitepapers\/wp-5g-systems.pdf\n\n. Accessed 5 Apr 2017"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Akhunzada A et al (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36\u201344","DOI":"10.1109\/MCOM.2015.7081073"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bicz\u00f3k G et al (2016) Private VNFs for collaborative multi-operator service delivery: an architectural case. In: Network operations and management symposium, 2016 IEEE\/IFIP. IEEE, pp 1249\u20131252","DOI":"10.1109\/NOMS.2016.7502996"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Dabbagh M, Hamdaoui B, Guizani M, Rayes A (2015) Software-defined networking security: pros and cons. IEEE Commun Mag 53(6):73\u201379","DOI":"10.1109\/MCOM.2015.7120048"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. RFC 5246","DOI":"10.17487\/rfc5246"},{"key":"10_CR8","unstructured":"ETSI (2014) NFV Security and Trust Guidance. Technical Report ETSI GS NFV-SEC003"},{"key":"10_CR9","unstructured":"ETSI (2014) NFV Security Problem Statement. Technical Report ETSI GS NFV-SEC001"},{"key":"10_CR10","unstructured":"ETSI (2015) Report on SDN usage in NFV architectural framework. Technical Report ETSI GS NFV-EVE 005"},{"key":"10_CR11","unstructured":"ETSI (2016) NFV MANO Report on Architectural Options. Technical Report ETSI GS NFV-IFA 009"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Fung CJ et al (2014) Quality of interaction among path computation elements for trust-aware inter-provider cooperation. In: 2014 IEEE international conference on communications. IEEE, pp 677\u2013682","DOI":"10.1109\/ICC.2014.6883397"},{"issue":"4","key":"10_CR13","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TNSM.2013.111113.130482","volume":"10","author":"M Gharbaoui","year":"2013","unstructured":"Gharbaoui M, Paolucci F, Giorgetti A, Martini B, Castoldi P (2013) Effective statistical detection of smart confidentiality attacks in multi-domain networks. IEEE Trans Netw Serv Manag 10(4):383\u2013397","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10_CR14","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.comnet.2016.07.013","volume":"108","author":"M Gharbaoui","year":"2016","unstructured":"Gharbaoui M et al (2016) An incentive-compatible and trust-aware multi-provider path computation element (PCE). Comput Netw 108:40\u201354","journal-title":"Comput Netw"},{"issue":"4","key":"10_CR15","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutorials 3(4):2\u201316","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"10_CR16","first-page":"1","volume":"28","author":"R Guerzoni","year":"2016","unstructured":"Guerzoni R et al (2016) Analysis of end-to-end multi-domain management and orchestration frameworks for software defined infrastructures: an architectural survey. Trans Emerg Telecommun Technol 28(4):1\u201319. \nhttp:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.3103\/full","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10_CR17","unstructured":"ITU-T (2003) Security architecture for systems providing end-to-end communications. X.805"},{"key":"10_CR18","unstructured":"Kazemian P et al (2013) Real time network policy checking using header space analysis. In: Presented as part of the 10th USENIX symposium on networked systems design and implementation, pp 99\u2013111"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Lim S, Ha J, Kim H, Kim Y, Yang S (2014) A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: 2014 sixth international conference on ubiquitous and future networks. IEEE, pp 63\u201368","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"10_CR20","unstructured":"Lopez D, de Dios O, Wu W, Dhody D (2016) Secure transport for pcep. Internet-Draft draft-ietf-pce-pceps-10, IETF Secretariat, July (2016). \nhttp:\/\/www.ietf.org\/internet-drafts\/draft-ietf-pce-pceps-10.txt"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Paolucci F, Gharbaoui M, Giorgetti A, Cugini F, Martini B, Valcarenghi L, Castoldi P (2011) Preserving confidentiality in PCE-based multi-domain networks. J Opt Commun Netw 3(5):465\u2013474. art. no. 5759822","DOI":"10.1364\/JOCN.3.000465"},{"issue":"4","key":"10_CR22","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1109\/SURV.2013.011413.00087","volume":"15","author":"F Paolucci","year":"2013","unstructured":"Paolucci F et al (2013) A survey on the path computation element (PCE) architecture. IEEE Commun Surv Tutorials 15(4):1819\u20131841","journal-title":"IEEE Commun Surv Tutorials"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Santos MAS et al (2014) Decentralizing SDN\u2019s control plane. In: 39th annual IEEE conference on local computer networks. IEEE, pp 402\u2013405","DOI":"10.1109\/LCN.2014.6925802"},{"issue":"1","key":"10_CR24","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","volume":"18","author":"S Scott-Hayward","year":"2015","unstructured":"Scott-Hayward S, Natarajan S, Sezer S (2015) A survey of security in software defined networks. IEEE Commun Surv Tutorials 18(1):623\u2013654","journal-title":"IEEE Commun Surv Tutorials"},{"key":"10_CR25","unstructured":"UNIFY EU FP7. \nhttp:\/\/www.fp7-unify.eu\/\n\n. Accessed 01 Dec 2016"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:38:41Z","timestamp":1510378721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_10","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}