{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:30Z","timestamp":1740098970673,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_2","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"33-73","source":"Crossref","is-referenced-by-count":2,"title":["NFV Security: Emerging Technologies and Standards"],"prefix":"10.1007","author":[{"given":"Igor","family":"Faynberg","sequence":"first","affiliation":[]},{"given":"Steve","family":"Goeringer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"2_CR1","unstructured":"Amzallag David (2014) \u201cNFV Insights: The making of NFV Security\u2014from Vision to Reality. Published by TNT at http:\/\/blog.tmcnet.com\/next-generation-communications\/2014\/06\/nfv-insights-the-making-of-nfv-security---from-vision-to-reality.html . Retrieved on December 14, 2016"},{"key":"2_CR2","unstructured":"ETSI Group Specification (2015) ETSI GS NFV-SEC 001 V1.1.1 (2014\u201310): Network Function Virtualization; NFV Security; Problem Statement"},{"key":"2_CR3","unstructured":"ETSI Group Specification (2015) ETSI GS NFV-SEC 002 V1.1.1 (2015-08): Network Functions Virtualization; NFV Security; Cataloguing security features in management software. Sophia Antipolis, France"},{"key":"2_CR4","volume-title":"Cloud computing: business trends and technologies","author":"I Faynberg","year":"2016","unstructured":"Faynberg I, Lu H, Skuler D (2016) Cloud computing: business trends and technologies. Wiley, LTF, Chichester"},{"key":"2_CR5","unstructured":"Open Network Foundation (2016) TR-530, Threat analysis for the SDN Architecture Version 1.0\u2033 ( https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/technical-reports\/Threat_Analysis_for_the_SDN_Architecture.pdf . Retrieved on December 19, 2016"},{"key":"2_CR6","unstructured":"Open Network Foundation (2014) OpenFlow switch specification version 1.3.4 (Protocol version 0x04). https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/onf-specifications\/openflow\/openflow-switch-v1.3.4.pdf . Retrieved on December 19, 2016"},{"key":"2_CR7","unstructured":"Open Network Foundation (2016) TR-535 \u201cONF SDN Evolution Version 1.0 ONF.\u201d Retrieved on December 19, 2016"},{"key":"2_CR8","unstructured":"Edsger W. Dijkstra, EWD 1305. https:\/\/www.cs.utexas.edu\/~EWD\/transcriptions\/EWD13xx\/EWD1305.html . Retrieved on December 19, 2016"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Scarfone K, Souppaya M, Hoffman P (2011) Guide to security for full virtualization technologies. Special Publication 800-125. National Institute of Standards and Technology. US Department of Commerce","DOI":"10.6028\/NIST.SP.800-125"},{"key":"2_CR10","unstructured":"Trusted Computing Group (2011) Virtualized trusted platform architecture specification. http:\/\/www.trustedcomputinggroup.org\/virtualized-trusted-platform-architecture-specification\/ . Retrieved in December 2016"},{"key":"2_CR11","unstructured":"ETSI Group Specification (2016) GS NFV-SEC 003 V1.2.1. Network Functions Virtualization (NFV); NFV Security; Security and Trust Guidance"},{"key":"2_CR12","unstructured":"ETSI Group Specification (2016) GS NFV-SEC 010 V1.1.1. Network Functions Virtualization (NFV); NFV Security; Report on Retained Data problem statement and requirements"},{"key":"2_CR13","unstructured":"Draft ETSI Group Specification ETSI GS NFV SEC 007 Network Functions Virtualization (NFV); NFV Security; Trust; Report on Attestation Technologies and Practices for Secure Deployments. Work in progress. https:\/\/portal.etsi.org\/webapp\/WorkProgram\/Report_WorkItem.asp?WKI_ID=44578 . Retrieved on December 5, 2016"},{"key":"2_CR14","unstructured":"Simpson AK, Schear N, Moyer T (2016) Runtime integrity measurement and enforcement with automated whitelist generation. In: Proceedings of annual computer security applications conference (ACSAC). Available at https:\/\/homes.cs.washington.edu\/~aksimpso\/publications\/ACSAC2014Abstract.pdf . Retrieved on December 5, 2016"},{"key":"2_CR15","unstructured":"ETSI Group Specification NFV-SEC 004 V1.1.1 (2015) Network Functions Virtualisation (NFV); NFV Security; Privacy and Regulation; Report on Lawful Interception Implications"},{"key":"2_CR16","unstructured":"Draft ETSI Group Specification NFV SEC 11 V0.0.6 (2016\u201305) Network Functions Virtualization (NFV); NFV Security; Trust; Report on Report on NFV LI Architecture. Work in progress. https:\/\/portal.etsi.org\/webapp\/WorkProgram\/Report_WorkItem.asp?WKI_ID=47603 . Retrieved on December 12, 2016"},{"key":"2_CR17","unstructured":"Draft ETSI Group Specification NFV-SEC 012 V0.0.13 (2016) Network Functions Virtualisation (NFV); Security; System architecture specification for execution of sensitive NFV components. Work in progress. https:\/\/portal.etsi.org\/webapp\/WorkProgram\/Report_WorkItem.asp?WKI_ID=47619 . Retrieved on December 15, 2016"},{"key":"2_CR18","unstructured":"Draft ETSI Group Specification NFV-SEC 013 V0.0.6 (2016) Network Functions Virtualisation (NFV); Security Report; Security Management and Monitoring for NFV [Release 2]. Work in progress. https:\/\/portal.etsi.org\/\/tb.aspx?tbid=799&SubTB=799 . Retrieved on December 21, 2016"},{"key":"2_CR19","unstructured":"ETSI Group Specification NFV-SEC 002 V1.1.1 (2015\u201308) Network Functions Virtualisation (NFV); NFV Security; Cataloguing security features in management software"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Leach P, Mealling M, Salz R (2005) RFC 1422, A Universally Unique IDentifier (UUID) URN Namespace. ( https:\/\/tools.ietf.org\/html\/rfc4122 )","DOI":"10.17487\/rfc4122"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T21:21:20Z","timestamp":1570310480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_2","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}