{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:47:53Z","timestamp":1754599673209,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380815"},{"type":"electronic","value":"9783642380822"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38082-2_12","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T08:43:53Z","timestamp":1366620233000},"page":"141-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Towards a Secure Network Virtualization Architecture for the Future Internet"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Martinez-Julia","sequence":"first","affiliation":[]},{"given":"Antonio F.","family":"Skarmeta","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Galis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Network Functions Virtualisation White Paper (2012), \n                      http:\/\/www.tid.es\/es\/Documents\/NFV_White_PaperV2.pdf"},{"key":"12_CR2","unstructured":"UniverSELF project (2013), \n                      http:\/\/www.univerself-project.eu\/"},{"key":"12_CR3","first-page":"1","volume-title":"Proceedings of the 2008 ACM CoNEXT Conference","author":"B. Ahlgren","year":"2008","unstructured":"Ahlgren, B., D\u2019Ambrosio, M., Marchisio, M., Marsh, I., Dannewitz, C., Ohlman, B., Pentikousis, K., Strandberg, O., Rembarz, R., Vercellone, V.: Design considerations for a network of information. In: Proceedings of the 2008 ACM CoNEXT Conference, pp. 1\u20136. ACM, New York (2008)"},{"issue":"3","key":"12_CR4","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1587\/transcom.E93.B.442","volume":"E93-B","author":"M. Brunner","year":"2010","unstructured":"Brunner, M., Abramowicz, H., Niebert, N., Correia, L.M.: 4WARD: A European perspective towards the future internet. IEICE Transactions on Communications\u00a0E93-B(3), 442\u2013445 (2010)","journal-title":"IEICE Transactions on Communications"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1145\/1151659.1159955","volume":"36","author":"M. Caesar","year":"2006","unstructured":"Caesar, M., Condie, T., Kannan, J., Lakshminarayanan, K., Stoica, I.: Rofl: Routing on flat labels. SIGCOMM Computer Communication Review\u00a036(4), 363\u2013374 (2006)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"12_CR6","unstructured":"Cheriton, D.R., Gritter, M.: Triad: A scalable deployable nat-based internet architecture. Tech. rep. (2000)"},{"key":"12_CR7","unstructured":"Edwall, T., et al.: Scalable and Adaptive Internet Solutions, SAIL (2011), \n                      http:\/\/www.sail-project.eu"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Farinacci, D., Fuller, V., Meyer, D., Lewis, D.: Locator\/id separation protocol (LISP). Internet-draft, IETF (2012)","DOI":"10.17487\/rfc6830"},{"key":"12_CR9","unstructured":"Gritter, M., Cheriton, D.R.: An architecture for content routing support in the internet. In: Proceedings of the Usenix Symposium on Internet Technologies and Systems (2001)"},{"key":"12_CR10","unstructured":"Gryb, O., et al.: XACML Light (2010), \n                      http:\/\/xacmllight.sourceforge.net"},{"key":"12_CR11","unstructured":"Gundavelli, S., et al.: Proxy Mobile IPv6 (2008), \n                      http:\/\/www.ietf.org\/rfc\/rfc5213.txt"},{"key":"12_CR12","unstructured":"ITU-T: Series X: Data Networks, Open system communications and security. Cyberspace security - Identity management. Baseline capabilities for enhancing global identity management and interoperability. Recommendation ITU-T X.1250 (2009)"},{"key":"12_CR13","unstructured":"ITU-T: Y.3001 Recommendation: \u201cFuture Network Vision - Objectives and Design Goals\u201d (2011)"},{"key":"12_CR14","unstructured":"ITU-T: Y.3011 Recommendation: \u201cNew Framework of Network Virtualization for Future Networks\u201d (2011)"},{"key":"12_CR15","unstructured":"ITU-T: Y.3021 Recommendation: \u201cNew Framework of Energy Saving for Future Networks\u201d (2011)"},{"key":"12_CR16","first-page":"1","volume-title":"Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009)","author":"V. Jacobson","year":"2009","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009), pp. 1\u201312. ACM, New York (2009)"},{"issue":"2","key":"12_CR17","first-page":"343","volume":"21","author":"H. Jung","year":"2011","unstructured":"Jung, H., Koh, S.J.: MOFI: Future internet architecture with address-free hosts for mobile environments. Telecommunications Review\u00a021(2), 343\u2013358 (2011)","journal-title":"Telecommunications Review"},{"issue":"3","key":"12_CR18","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1587\/transcom.E93.B.478","volume":"E93-B","author":"V.P. Kafle","year":"2010","unstructured":"Kafle, V.P., Inoue, M.: HIMALIS: Heterogeneity inclusion and mobility adaptation through locator id separation in new generation network. IEICE Transactions on Communications\u00a0E93-B(3), 478\u2013489 (2010)","journal-title":"IEICE Transactions on Communications"},{"key":"12_CR19","unstructured":"Klyne, G., Carroll, J.J.: Resource Description Framework (RDF): Concepts and Abstract Syntax (2004), \n                      http:\/\/www.w3.org\/TR\/rdf-concepts\/"},{"issue":"12","key":"12_CR20","first-page":"1643","volume":"18","author":"P. Martinez-Julia","year":"2012","unstructured":"Martinez-Julia, P., Gomez-Skarmeta, A.F.: A novel identity-based network architecture for next generation internet. Journal of Universal Computer Science\u00a018(12), 1643\u20131661 (2012)","journal-title":"Journal of Universal Computer Science"},{"issue":"2","key":"12_CR21","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.compeleceng.2011.11.021","volume":"38","author":"P. Martinez-Julia","year":"2012","unstructured":"Martinez-Julia, P., Gomez-Skarmeta, A.F.: Using identities to achieve enhanced privacy in future content delivery networks. Computers and Electrical Engineering\u00a038(2), 346\u2013355 (2012)","journal-title":"Computers and Electrical Engineering"},{"key":"12_CR22","unstructured":"Martinez-Julia, P., Gomez-Skarmeta, A.F., Girao, J., Sarma, A.: Protecting digital identities in future networks. In: Proceedings of the Future Network and Mobile Summit 2011, pp. 1\u20138. International Information Management Corporation (2011)"},{"issue":"1","key":"12_CR23","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1587\/transinf.E95.D.108","volume":"E95-D","author":"P. Martinez-Julia","year":"2012","unstructured":"Martinez-Julia, P., Gomez-Skarmeta, A.F., Kafle, V.P., Inoue, M.: Secure and robust framework for id\/locator mapping system. IEICE Transactions on Information and Systems\u00a0E95-D(1), 108\u2013116 (2012)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"12_CR24","unstructured":"Martinez-Julia, P., Skarmeta, A.F., Jung, H.Y., Koh, S.J.: Evaluating secure identification in the mobile oriented future internet (mofi) architecture. In: Proceedings of the Future Network and Mobile Summit 2012, pp. 1\u20138. International Information Management Corporation (2012)"},{"key":"12_CR25","unstructured":"Martinez-Julia, P., Skarmeta, A.F., Kafle, V.P.: Research and experimentation with the himalis network architecture for future internet. In: Proceedings of the Future Network and Mobile Summit 2012, pp. 1\u20138. International Information Management Corporation (2012)"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture (2006), \n                      http:\/\/www.ietf.org\/rfc\/rfc4423.txt","DOI":"10.17487\/rfc4423"},{"key":"12_CR27","unstructured":"OASIS XACML Technical Committee: XACML: eXtensible Access Control Markup Language (2010), \n                      http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"12_CR28","first-page":"14","volume-title":"Proceedings of the International Conference on Communications","author":"J. Pan","year":"2009","unstructured":"Pan, J., Jain, R., Paul, S., Bowman, M., Xu, X., Chen, S.: Enhanced milsa architecture for naming, addressing, routing and security issues in the next generation internet. In: Proceedings of the International Conference on Communications, pp. 14\u201318. IEEE, Washington, DC (2009)"},{"key":"12_CR29","first-page":"2264","volume-title":"Proceedings of the Global Communications Conference","author":"J. Pan","year":"2008","unstructured":"Pan, J., Paul, S., Jain, R., Bowman, M.: Milsa: A mobility and multihoming supporting identifier locator split architecture for naming in the next generation internet. In: Proceedings of the Global Communications Conference, pp. 2264\u20132269. IEEE, Washington, DC (2008)"},{"key":"12_CR30","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-30241-1_6","volume-title":"The Future Internet,","author":"D. Papadimitriou","year":"2012","unstructured":"Papadimitriou, D., Zahariadis, T., Martinez-Julia, P., Papafili, I., Morreale, V., Torelli, F., Sales, B., Demeester, P.: Design principles for the future internet architecture. In: FIA 2012, LNCS, vol.\u00a07281, pp. 55\u201367. Springer, Heidelberg (2012)"},{"issue":"11","key":"12_CR31","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2011.6069708","volume":"49","author":"D. Pfisterer","year":"2011","unstructured":"Pfisterer, D., Romer, K., Bimschas, D., Kleine, O., Mietz, R., Truong, C., Hasemann, H., Pagel, M., Hauswirth, M., Karnstedt, M., et al.: Spitfire: Toward a semantic web of things. IEEE Communications Magazine\u00a049(11), 40\u201348 (2011)","journal-title":"IEEE Communications Magazine"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1179529.1179532","volume-title":"Proceedings of the Second ACM Workshop on Digital Identity Management","author":"D. Recordon","year":"2006","unstructured":"Recordon, D., Reed, D.: Openid 2.0: A platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11\u201316. ACM, New York (2006)"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1373290.1373294","volume-title":"Proceedings of the 7th Symposium on Identity and Trust on the Internet (IDtrust 2008)","author":"D. Reed","year":"2008","unstructured":"Reed, D., Chasen, L., Tan, W.: Openid identity discovery with XRI and XRDS. In: Proceedings of the 7th Symposium on Identity and Trust on the Internet (IDtrust 2008), pp. 19\u201325. ACM, New York (2008)"},{"issue":"12","key":"12_CR34","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2011.6094010","volume":"49","author":"J. Rubio-Loyola","year":"2011","unstructured":"Rubio-Loyola, J., Galis, A., Astorga, A., Serrat, J., Lefevre, L., Fischer, A., Paler, A., Meer, H.: Scalable service deployment on software-defined networks. IEEE Communications Magazine\u00a049(12), 84\u201393 (2011)","journal-title":"IEEE Communications Magazine"},{"key":"12_CR35","unstructured":"Security assertion markup language (saml), \n                      http:\/\/saml.xml.org"},{"key":"12_CR36","unstructured":"Shibboleth, \n                      http:\/\/shibboleth.internet2.edu"},{"key":"12_CR37","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/383059.383071","volume-title":"Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 149\u2013160. ACM, New York (2001)"},{"key":"12_CR38","unstructured":"Trossen, D., et al.: Pursuing a Pub\/Sub Internet, PURSUIT (2011), \n                      http:\/\/www.fp7-pursuit.eu"},{"key":"12_CR39","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/781027.781042","volume-title":"Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","author":"H. Zhang","year":"2003","unstructured":"Zhang, H., Goel, A., Govindan, R.: Incrementally improving lookup latency in distributed hash table systems. In: Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 114\u2013125. ACM, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","The Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38082-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T14:21:55Z","timestamp":1737123715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38082-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380815","9783642380822"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38082-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}