{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:43Z","timestamp":1742913643334,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_11","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"145-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains"],"prefix":"10.1007","author":[{"given":"Michael","family":"Grabatin","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Hommel","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Steinke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Bari, M.F., Chowdhury, S.R., Ahmed, R., Boutaba, R.: PolicyCop: an autonomic QoS policy enforcement framework for software defined networks. In: Future Networks and Services (SDN4FNS), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702548"},{"key":"11_CR2","doi-asserted-by":"publisher","unstructured":"Basnet, S.R., Shakya, S.: BSS: blockchain security over software defined network. In: 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 720\u2013725, May 2017. \n                  https:\/\/doi.org\/10.1109\/CCAA.2017.8229910","DOI":"10.1109\/CCAA.2017.8229910"},{"key":"11_CR3","volume-title":"Network Management Fundamentals","author":"A Clemm","year":"2006","unstructured":"Clemm, A.: Network Management Fundamentals. Cisco Press, Indianapolis (2006)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.future.2015.03.008","volume":"55","author":"G Modica Di","year":"2016","unstructured":"Di Modica, G., Tomarchio, O.: Matchmaking semantic security policies in heterogeneous clouds. Future Gener. Comput. Syst. 55, 176\u2013185 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/MWC.2017.1700011","volume":"25","author":"A Machen","year":"2018","unstructured":"Machen, A., Wang, S., Leung, K.K., Ko, B.J., Salonidis, T.: Live service migration in mobile edge clouds. IEEE Wirel. Commun. 25(1), 140\u2013147 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"11_CR6","unstructured":"Moghaddam, F.F., Majd, A., Ahmadi, M., Khodadadi, T., Madadipouya, K.: A dynamic classification index to enhance data protection procedures in cloud-based environments. In: 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), pp. 17\u201322. IEEE (2015)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Moghaddam, F.F., Wieder, P., Yahyapour, R.: Federated policy management engine for reliable cloud computing. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 910\u2013915. IEEE (2017)","DOI":"10.1109\/ICUFN.2017.7993931"},{"key":"11_CR8","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013). \n                  http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.pdf"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Peters, G.W., Panayi, E.: Understanding modern banking ledgers through blockchain technologies: future of transaction processing and smart contracts on the internet of money. \n                  arXiv:1511.05740\n                  \n                 [cs] (2015)","DOI":"10.2139\/ssrn.2692487"},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MCOM.2015.7045397","volume":"53","author":"J Soares","year":"2015","unstructured":"Soares, J., et al.: Toward a telco cloud environment for service functions. IEEE Commun. Mag. 53(2), 98\u2013106 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1016\/j.jnca.2012.07.007","volume":"35","author":"SK Sood","year":"2012","unstructured":"Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831\u20131838 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Yildiz, M., Abawajy, J., Ercan, T., Bernoth, A.: A layered security approach for cloud computing infrastructure. In: 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), pp. 763\u2013767. IEEE (2009)","DOI":"10.1109\/I-SPAN.2009.157"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:48:55Z","timestamp":1558396135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}