{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T21:44:10Z","timestamp":1743889450647},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_2","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T04:56:55Z","timestamp":1500958615000},"page":"19-30","source":"Crossref","is-referenced-by-count":6,"title":["Experiences in Trusted Cloud Computing"],"prefix":"10.1007","author":[{"given":"Ian","family":"Oliver","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Silke","family":"Holtmanns","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yoan","family":"Miche","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shankar","family":"Lal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leo","family":"Hippel\u00e4inen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aapo","family":"Kalliola","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sowmya","family":"Ravidas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Yang, W., Fung, C.: A survey on security in network function virtualisation. In: IEEE NetSoft Conference and Workshops, pp. 15\u201319 (2016)","DOI":"10.1109\/NETSOFT.2016.7502434"},{"key":"2_CR2","unstructured":"Operators, N.: Network functions virtualization, an introduction, benefits, enablers, challenges and call for action. In: SDN and OpenFlow SDN and OpenFlow World Congress (2012)"},{"key":"2_CR3","unstructured":"ETSI, G.: Network functions virtualisation (NFV): architectural framework. ETSI GS NFV 2(2), V1.ETSI (2013)"},{"key":"2_CR4","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (2004)"},{"issue":"2","key":"2_CR5","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","volume":"53","author":"B Han","year":"2015","unstructured":"Han, B., Gopalakrishnan, V., Ji, L., Lee, S.: Network function virtualization: Challenges and opportunities for innovations. IEEE Commun. Mag. 53(2), 90\u201397 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-13869-0_14","volume-title":"Trust and Trustworthy Computing","author":"FJ Krautheim","year":"2010","unstructured":"Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 211\u2013227. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13869-0_14"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Rocha, F., Correia, M.: Lucy in the sky without diamonds: stealing confidential data in the cloud. In: 2011 IEEE\/IFIP 41st International Conference Dependable Systems and Networks Workshops (DSN-W), pp. 129\u2013134 (2011)","DOI":"10.1109\/DSNW.2011.5958798"},{"key":"2_CR8","unstructured":"ETSI, G.: NFV Security and Trust Guidance, ETSI GS NFV-SEC 003 V1.1.1 (2014)"},{"key":"2_CR9","unstructured":"ETSI, G.: Network Function Virtualization: Trust; Report on Attestation Technologies and Practices for Secure Deployments, ETSI GS NFV SEC 007 V0.0.3 (2015)"},{"issue":"5","key":"2_CR10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"KM Khan","year":"2010","unstructured":"Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20\u201327 (2010)","journal-title":"IT Prof."},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-73547-2_21","volume-title":"Autonomic and Trusted Computing","author":"F Stumpf","year":"2007","unstructured":"Stumpf, F., Benz, M., Hermanowski, M., Eckert, C.: An approach to a trustworthy system architecture using virtualization. In: Xiao, B., Yang, Laurence T., Ma, J., Muller-Schloer, C., Hua, Yu. (eds.) ATC 2007. LNCS, vol. 4610, pp. 191\u2013202. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73547-2_21"},{"key":"2_CR12","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","volume":"9","author":"Z Yan","year":"2015","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Netw. 9, 3059\u20133069 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"2_CR13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Int. Serv. Appl. 1(1), 7\u201318 (2010)","journal-title":"J. Int. Serv. Appl."},{"key":"2_CR14","unstructured":"Sowmya, R., Lal, S., Oliver, I., Hippelainen, L.: Incorporating Trust in NFV: Addressing the Challenges, IEEE ICIN (2017, to appear)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Lal, S., Sowmya, R., Oliver, I., Taleb, T.: Assuring VNF image integrity and host sealing in Telco Cloud, IEEE ICC (2017, to appear)","DOI":"10.1109\/ICC.2017.7997299"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T11:12:28Z","timestamp":1569928348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}