{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:45:18Z","timestamp":1762623918239,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_13","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"139-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing"],"prefix":"10.1007","author":[{"given":"Guangwu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yankun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"issue":"16","key":"13_CR1","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","volume":"9","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Netw. 9(16), 3059\u20133069 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Yang, W., Fung, C.: A survey on security in network functions virtualization. In: Proceeding of IEEE NetSoft 2016, pp. 15\u201319, Seoul (2016)","DOI":"10.1109\/NETSOFT.2016.7502434"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Aljuhani, A., Alharbi, T.: Virtualized network functions security attacks and vulnerabilities. In: Proceeding of IEEE CCWC 2017, pp. 1\u20134, Las Vegas (2017)","DOI":"10.1109\/CCWC.2017.7868478"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Shin, M.K., Choi, Y., Kwak, H.H., Pack S., Kang M., Choi, J.Y.: Verification for NFV-enabled network services. In: Proceeding of IEEE ICTC 2015, pp. 810\u2013815, Jeju (2015)","DOI":"10.1109\/ICTC.2015.7354672"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Y., Guo, Z., Shou, G., Hu, Y.: To achieve a security service chain by integration of NFV and SDN. In: Proceeding of IEEE IMCCC 2016, pp. 974\u2013977, Harbin (2016)","DOI":"10.1109\/IMCCC.2016.162"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Jang, H., Jeong, J., Kim, H., Park, J.S.: A survey on interfaces to network security functions in network virtualization. In: Proceeding of IEEE AINA 2015, pp. 160\u2013163, Gwangiu (2015)","DOI":"10.1109\/WAINA.2015.103"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Bicz\u00f3k, G., Sonkoly, B., Bereczky, N., Boyd, C.: Private VNFs for collaborative multi-operator service delivery: an architectural case. In: Proceeding of NOMS 2016, pp. 1249\u20131252, Istanbul (2016)","DOI":"10.1109\/NOMS.2016.7502996"},{"issue":"8","key":"13_CR8","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/JLT.2016.2646921","volume":"35","author":"A Aguado","year":"2017","unstructured":"Aguado, A., Hugues-Salas, E., Haigh, P.A., Marhuenda, J., Price, A.B., Sibson, P.: Secure NFV orchestration over an SDN-controlled optical network with time-shared quantum key distribution resources. J. Lightwave Technol. 35(8), 1357\u20131362 (2017)","journal-title":"J. Lightwave Technol."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Bari, M.F., Chowdhury, S. R., Ahmed, R., Boutaba, R.: On orchestrating virtual network functions. In: Proceeding of IEEE CNSM 2015, pp. 50\u201356, Barcelona (2015)","DOI":"10.1109\/CNSM.2015.7367338"},{"key":"13_CR10","unstructured":"Strasser, M., Sevnic, P.E.: A software-based TPM emulator for Linux. ETH Zurich, Semesterarbeit (2004)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Ren, J., Liu, L., Zhang, D., Zhang, Q., Ba, H.: Tenants attested trusted cloud service. In: Proceeding. IEEE CLOUD 2016, pp. 600\u2013607, San Francisco (2016)","DOI":"10.1109\/CLOUD.2016.0085"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-540-30079-3_2","volume-title":"Trust and Privacy in Digital Business","author":"Z Yan","year":"2004","unstructured":"Yan, Z., Cofta, P.: A mechanism for trust sustainability among trusted computing platforms. In: Katsikas, S., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 11\u201319. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30079-3_2"},{"key":"13_CR13","volume-title":"Trust Management in Mobile Environments - Usable and Autonomic Models","author":"Z Yan","year":"2013","unstructured":"Yan, Z.: Trust Management in Mobile Environments - Usable and Autonomic Models. IGI Global, Hershey (2013)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lauer, H., Kuntze, N.: Hypervisor-based attestation of virtual environments. In: Proceeding of IEEE UIC\/ATC\/ScalCom\/SmartWorld 2016, pp. 333\u2013340, Toulouse (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0067"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Mathieu, B., Doyen, G., Mallouli, W., et al.: Monitoring and securing new functions deployed in a virtualized networking environment. In: Proceedings of ICARS 2015, pp. 741\u2013748, Toulouse (2015)","DOI":"10.1109\/ARES.2015.71"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T11:26:03Z","timestamp":1570447563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}