{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:21Z","timestamp":1761401901434,"version":"3.37.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_4","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"103-124","source":"Crossref","is-referenced-by-count":2,"title":["Trust in SDN\/NFV Environments"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Lioy","sequence":"first","affiliation":[]},{"given":"Tao","family":"Su","sequence":"additional","affiliation":[]},{"given":"Adrian L.","family":"Shaw","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Attak","sequence":"additional","affiliation":[]},{"given":"Diego R.","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Pastor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"4_CR1","unstructured":"Sailer R, Zhang X, Jaeger T, van Doorn L (2004) Design and implementation of a TCG-based integrity measurement architecture. In: USENIX\u201904: 13th USENIX security symposium, San Diego, 27 June\u201302 July 2004, pp 223\u2013238"},{"key":"4_CR2","unstructured":"Berger S, C\u00e1ceres R, Goldman KA, Perez R, Sailer R, van Doorn L (2006) vTPM: virtualizing the trusted platform module. In: USENIX\u201906: 15th USENIX security symposium, Vancouver, 31 July\u20134 Aug 2006, pp 305\u2013320"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Goldman K, Sailer R, Pendarakis D, Srinivasan D (2010) Scalable integrity monitoring in virtualized environments. In: STC\u201910: 5th ACM workshop on scalable trusted computing, Chicago, 4\u20138 Oct 2010, pp 73\u201378","DOI":"10.1145\/1867635.1867647"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: a virtual machine-based platform for trusted computing. In: 19th ACM symposium on operating systems principles, Bolton Landing, 19\u201322 Oct 2003, pp 193\u2013206","DOI":"10.1145\/945445.945464"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Schiffman J, Vijayakumar H, Jaeger T (2012) Verifying system integrity by proxy. In: 5th International conference on trust and trustworthy computing, Vienna, June 13\u201315, 2012, pp 179\u2013200","DOI":"10.1007\/978-3-642-30921-2_11"},{"key":"4_CR6","unstructured":"Xen project. \nhttps:\/\/www.xenproject.org\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR7","unstructured":"Fioravante M, De Graaf D (2012) Virtual trusted platform module (vTPM) subsystem for Xen, 12 Nov 2012. \nhttp:\/\/xenbits.xen.org\/docs\/4.6-testing\/misc\/vtpm.txt\n\n. Visited 27 Mar 2017"},{"key":"4_CR8","unstructured":"OpenAttestation SDK v1.7. \nhttps:\/\/github.com\/OpenAttestation\/OpenAttestation\/tree\/v1.7\n\n. Visited 27 Mar 2017"},{"key":"4_CR9","unstructured":"Trusted Computing Group (2006) TCG infrastructure working group integrity report schema specification. \nhttp:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/IWG-IntegrityReport_Schema_Specification_v1.pdf\n\n. Visited 27 Mar 2017"},{"key":"4_CR10","unstructured":"Xen project mailing list (2014) vtpmmgr bug: fails to start if locality not 0. \nhttps:\/\/lists.xen.org\/archives\/html\/xen-devel\/2014-11\/msg00606.html\n\n. Visited 27 Mar 2017"},{"key":"4_CR11","unstructured":"Fioravante M, De Graaf D Virtual TPM interface for Xen. \nhttps:\/\/www.kernel.org\/doc\/Documentation\/security\/tpm\/xen-tpmfront.txt\n\n. Visited 27 Mar 2017"},{"key":"4_CR12","unstructured":"Docker \u2013 home page, \nhttps:\/\/www.docker.com\n\n. Visited 27 March 2017"},{"key":"4_CR13","unstructured":"Brandon J (2015) Deutsche Telekom experimenting with NFV in Docker, 9 Feb 2015. \nhttp:\/\/www.businesscloudnews.com\/2015\/02\/09\/deutsche-telekom-experimenting-with-nfv-in-docker\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Weijie Liu, Bobba RB, Mohan S, Campbell RH (2015) Inter-flow consistency: a novel SDN update abstraction for supporting inter-flow constraints. In: CNS-2015: IEEE conference on communications and network security, Florence, 28\u201330 Sept 2015, pp 469\u2013478","DOI":"10.14722\/sent.2015.23006"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Schiff L, Schmid S, Kuznetsov P (2016) In-band synchronization for distributed SDN control planes. ACM SIGCOMM Comput Commun Rev 46(1):37\u201343. doi:\n10.1145\/2875951.2875957","DOI":"10.1145\/2875951.2875957"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Jacquin L, Shaw A, Dalton C (2015) Towards trusted software-defined networks using a hardware-based integrity measurement architecture. In: 1st IEEE conference on network softwarization, London, 13\u201317 Apr 2015, pp 1\u20136","DOI":"10.1109\/NETSOFT.2015.7116186"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374. doi:\n10.1145\/1355734.1355746","DOI":"10.1145\/1355734.1355746"},{"key":"4_CR18","unstructured":"Pfaff B, Pettit J, Koponen T, Jackson E, Zhou A, Rajahalme J, Gross J, Wang A, Stringer J, Shelar P, Amidon K (2015) The design and implementation of open vSwitch. In: NSDI\u201915: 12th USENIX conference on networked systems design and implementation, Oakland, 4\u20136 May 2015, pp 117\u2013130"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Cesena E, Ramunno G, Sassu R, Vernizzi D, Lioy A (2011) On scalability of remote attestation. In: STC\u201911: 6th ACM workshop on scalable trusted computing, Chicago, 17\u201321 Oct 2011, pp 25\u201330","DOI":"10.1145\/2046582.2046588"},{"key":"4_CR20","unstructured":"Skoudis E, Zeltser L (2004) Malware: fighting malicious code. Prentice Hall Professional, Upper Saddle River, pp 465\u2013481"},{"key":"4_CR21","unstructured":"Trusted Computing Group (2011) Virtualized trusted platform architecture specification, Sept 2011. \nhttp:\/\/www.trustedcomputinggroup.org\/resources\/virtualized_trusted_platform_architecture_specification\n\n. Visited 27 Mar 2017"},{"key":"4_CR22","unstructured":"ETSI (2014) Network functions virtualisation (NFV); NFV security; problem statement, ETSI GS NFV-SEC 001 v1.1.1, Oct 2014. \nhttp:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/001\/01.01.01_60\/gs_NFV-SEC001v010101p.pdf\n\n. Visited 27 Mar 2017"},{"key":"4_CR23","unstructured":"ETSI, Network function virtualisation (NFV); trust; report on attestation technologies and practices for secure deployments, ETSI GS NFV-SEC 007 (draft). \nhttp:\/\/docbox.etsi.org\/ISG\/NFV\/Open\/Drafts\/SEC007_NFV_Attestation_report\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR24","unstructured":"IETF Interface to Network Security Functions Working Group. \nhttps:\/\/datatracker.ietf.org\/wg\/i2nsf\/charter\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR25","unstructured":"Hares S, Dunbar L, Lopez D, Zarny M, Jacquenet C (2016) I2NSF problem statement and use cases. Internet-Draft draft-ietf-i2nsf-problem-and-use-cases-01, July 2016. \nhttps:\/\/datatracker.ietf.org\/doc\/draft-ietf-i2nsf-problem-and-use-cases\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR26","unstructured":"Lopez E, Lopez D, Dunbar L, Strassner J, Zhuang X, Parrott J, Krishnan RR, Durbha S, Kumar R, Lohiya A (2016) Framework for interface to network security functions. Internet-Draft draft-ietf-i2nsf-framework-03, Aug 2016. \nhttps:\/\/datatracker.ietf.org\/doc\/draft-ietf-i2nsf-framework\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR27","unstructured":"Pastor A, Lopez D, Shaw A (2016) Remote attestation procedures for network security functions (NSFs) through the I2NSF security controller, Internet-draft draft-pastor-i2nsf-vnsf-attestation-03, July 2016. \nhttps:\/\/datatracker.ietf.org\/doc\/draft-pastor-i2nsf-vnsf-attestation\/\n\n. Visited 27 Mar 2017"},{"key":"4_CR28","unstructured":"NSA, Security-enhanced Linux. \nhttps:\/\/www.nsa.gov\/what-we-do\/research\/selinux\/\n\n. Visited 27 Mar 2017"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:36:01Z","timestamp":1510378561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_4","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}