{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:15:00Z","timestamp":1742919300374,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_33","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"462-479","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi Slice SLA Collaboration and Optimization of Power 5G Big Data Security Business"],"prefix":"10.1007","author":[{"given":"Daohua","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Yajuan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yunxiao","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"2","key":"33_CR1","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1007\/s10586-021-03496-w","volume":"25","author":"S Jain","year":"2022","unstructured":"Jain, S., Gupta, S., Sreelakshmi, K.K., et al.: Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. Clust. Comput. 25(2), 1111\u20131154 (2022)","journal-title":"Clust. Comput."},{"issue":"12","key":"33_CR2","doi-asserted-by":"publisher","first-page":"220305","DOI":"10.1007\/s11432-019-2835-4","volume":"63","author":"SA Soleymani","year":"2020","unstructured":"Soleymani, S.A., Anisi, M.H., Abdullah, A.H., et al.: An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Science China Inf. Sci. 63(12), 220305 (2020)","journal-title":"Science China Inf. Sci."},{"issue":"9","key":"33_CR3","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/s12243-019-00721-x","volume":"74","author":"S Behrad","year":"2019","unstructured":"Behrad, S., Bertin, E., Crespi, N.: A survey on authentication and access control for mobile networks: from 4G to 5G. Ann. Telecommun. 74(9), 593\u2013603 (2019)","journal-title":"Ann. Telecommun."},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Aggarwal, S., Kumar, N.: Fog computing for 5G-enabled tactile Internet: research issues, challenges, and future research directions. Mob. Netw. Appl. (2019)","DOI":"10.1007\/s11036-019-01430-4"},{"issue":"1","key":"33_CR5","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s12083-020-00971-w","volume":"14","author":"SP Sankar","year":"2021","unstructured":"Sankar, S.P., Subash, T.D., Vishwanath, N., et al.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and Internet of Things. Peer-to-Peer Network. Appl. 14(1), 392\u2013402 (2021)","journal-title":"Peer-to-Peer Network. Appl."},{"issue":"3","key":"33_CR6","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1007\/s00170-019-04389-4","volume":"107","author":"Y Chu","year":"2020","unstructured":"Chu, Y., Pan, L., Leng, K., et al.: Research on key technologies of service quality optimizationfor industrial IoT 5G network for intelligent manufacturing. Int. J. Adv. Manuf. Technol. 107(3), 1071\u20131080 (2020)","journal-title":"Int. J. Adv. Manuf. Technol."},{"issue":"6","key":"33_CR7","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s00607-020-00893-8","volume":"103","author":"Y Benslimen","year":"2021","unstructured":"Benslimen, Y., Sedjelmaci, H., Manenti, A.-C.: Attacks and failures prediction framework for a collaborative 5G mobile network. Computing 103(6), 1165\u20131181 (2021). https:\/\/doi.org\/10.1007\/s00607-020-00893-8","journal-title":"Computing"},{"issue":"3","key":"33_CR8","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1007\/s11277-017-4101-y","volume":"96","author":"P Lindgren","year":"2017","unstructured":"Lindgren, P., Wuropulos, K.: Secure persuasive business models and business model innovation in a world of 5G. Wirel. Pers. Commun. 96(3), 3569\u20133583 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"8","key":"33_CR9","doi-asserted-by":"publisher","first-page":"081301","DOI":"10.1007\/s11432-017-9426-4","volume":"61","author":"X Ji","year":"2018","unstructured":"Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology. Science China Inf. Sci. 61(8), 081301 (2018)","journal-title":"Science China Inf. Sci."},{"issue":"4","key":"33_CR10","doi-asserted-by":"publisher","first-page":"3447","DOI":"10.1007\/s11277-021-08416-0","volume":"119","author":"A Sharma","year":"2021","unstructured":"Sharma, A., Jha, R.K.: A comprehensive survey on security issues in 5G wireless communication network using beamforming approach. Wirel. Pers. Commun. 119(4), 3447\u20133501 (2021)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"33_CR11","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s13042-020-01178-4","volume":"12","author":"H Fourati","year":"2021","unstructured":"Fourati, H., Maaloul, R., Chaari, L.: A survey of 5G network systems: challenges and machine learning approaches. Int. J. Mach. Learn. Cybern. 12(2), 385\u2013431 (2021)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"3","key":"33_CR12","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1007\/s11277-021-08554-5","volume":"120","author":"IP Chochliouros","year":"2021","unstructured":"Chochliouros, I.P., Spiliopoulou, A.S., Kostopoulos, A., et al.: Security threat analysis of the 5G ESSENCE platform. Wirel. Pers. Commun. 120(3), 2409\u20132426 (2021)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"33_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s10922-021-09623-7","volume":"30","author":"JM Jorquera Valero","year":"2021","unstructured":"Jorquera Valero, J.M., S\u00e1nchez S\u00e1nchez, P.M., Lekidis, A., et al.: Design of a security and trust framework for 5G multi-domain scenarios. J. Netw. Syst. Manag. 30(1), 7 (2021)","journal-title":"J. Netw. Syst. Manag."},{"issue":"2","key":"33_CR14","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s11235-019-00607-2","volume":"73","author":"SA AlQahtani","year":"2020","unstructured":"AlQahtani, S.A., Alhomiqani, W.A.: A multi-stage analysis of network slicing architecture for 5G mobile networks. Telecommun. Syst. 73(2), 205\u2013221 (2020)","journal-title":"Telecommun. Syst."},{"issue":"4","key":"33_CR15","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11235-020-00673-x","volume":"74","author":"M Luo","year":"2020","unstructured":"Luo, M., Wu, J., Li, X.: Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommun. Syst. 74(4), 437\u2013449 (2020)","journal-title":"Telecommun. Syst."},{"issue":"3","key":"33_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11235-021-00815-9","volume":"78","author":"T Liu","year":"2021","unstructured":"Liu, T., Wu, F., Li, X., et al.: A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3), 317\u2013329 (2021)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"33_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11277-019-06274-5","volume":"106","author":"S De Dutta","year":"2019","unstructured":"De Dutta, S., Prasad, R.: Security for smart grid in 5G and beyond networks. Wirel. Pers. Commun. 106(1), 261\u2013273 (2019)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"33_CR18","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s41745-020-00160-x","volume":"100","author":"A Nayak Manjeshwar","year":"2020","unstructured":"Nayak Manjeshwar, A., Jha, P., Karandikar, A., et al.: VirtRAN: an SDN\/NFV-based framework for 5G RAN slicing. J. Indian Inst. Sci. 100(2), 409\u2013434 (2020)","journal-title":"J. Indian Inst. Sci."},{"issue":"4","key":"33_CR19","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s11235-021-00877-9","volume":"79","author":"T Mumtaz","year":"2022","unstructured":"Mumtaz, T., Muhammad, S., Aslam, M.I., et al.: Inter-slice resource management for 5G radio access network using markov decision process. Telecommun. Syst. 79(4), 541\u2013557 (2022)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"33_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s13635-018-0072-0","volume":"2018","author":"Z Kotulski","year":"2018","unstructured":"Kotulski, Z., Nowak, T.W., Sepczuk, M., et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 2 (2018)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"7","key":"33_CR21","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1007\/s11276-018-01917-0","volume":"25","author":"SA AlQahtani","year":"2019","unstructured":"AlQahtani, S.A., Altamrah, A.S.: Supporting QoS requirements provisions on 5G network slices using an efficient priority-based polling technique. Wireless Netw. 25(7), 3825\u20133838 (2019)","journal-title":"Wireless Netw."},{"issue":"1","key":"33_CR22","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1186\/s13638-021-02067-2","volume":"2021","author":"M Maman","year":"2021","unstructured":"Maman, M., Calvanese-Strinati, E., Dinh, L.N., et al.: Beyond private 5G networks: applications, architectures, operator models and technological enablers. EURASIP J. Wirel. Commun. Netw. 2021(1), 195 (2021)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Mathew, A.: Network slicing in 5G and the security concerns. In: Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), F 11\u201313 March 2020 (2020)","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00014"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Sattar, D., Matrawy, A.: Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), F 10\u201312 June 2019 (2019)","DOI":"10.1109\/CNS.2019.8802852"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Kapassa, E., Touloupou, M., Stavrianos, P., et al.: Dynamic 5G slices for IoT applications with diverse requirements. In: Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, F 15\u201318 October 2018 (2018)","DOI":"10.1109\/IoTSMS.2018.8554386"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Gr\u00f8nsund, P., Gonzalez, A., Mahmood, K., et al.: 5G service and slice implementation for a military use case. In: Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), F 7\u201311 June 2020 (2020)","DOI":"10.1109\/ICCWorkshops49005.2020.9145236"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Mahmood, K., Mahmoodi, T., Trivisonno, R., et al.: On the integration of verticals through 5G control plane. In: Proceedings of the 2017 European Conference on Networks and Communications (EuCNC), F 12\u201315 June 2017 (2017)","DOI":"10.1109\/EuCNC.2017.7980677"},{"key":"33_CR28","doi-asserted-by":"crossref","unstructured":"Bega, D., Gramaglia, M., Banchs, A., et al.: Optimising 5G infrastructure markets: the business of network slicing. In: Proceedings of the IEEE Infocom-IEEE Conference on Computer Communications, F (2017)","DOI":"10.1109\/INFOCOM.2017.8057045"},{"issue":"2","key":"33_CR29","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TNET.2019.2895378","volume":"27","author":"P Caballero","year":"2019","unstructured":"Caballero, P., Banchs, A., Veciana, G.D., et al.: Network slicing games: enabling customization in multi-tenant mobile networks. IEEE\/ACM Trans. Network. 27(2), 662\u2013675 (2019)","journal-title":"IEEE\/ACM Trans. Network."},{"issue":"11","key":"33_CR30","doi-asserted-by":"publisher","first-page":"2512","DOI":"10.1109\/JSAC.2017.2760147","volume":"35","author":"N Zhang","year":"2017","unstructured":"Zhang, N., Liu, Y.F., Farmanbar, H., et al.: Network slicing for service-oriented networks under resource constraints. IEEE J. Sel. Areas Commun. 35(11), 2512\u20132521 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"19","key":"33_CR31","first-page":"691","volume":"6","author":"W Guan","year":"2018","unstructured":"Guan, W., Wen, X., Wang, L., et al.: A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access 6(19), 691\u2013701 (2018)","journal-title":"IEEE Access"},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Kotulski Z, Nowak T, Sepczuk M, et al.: On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), F 3\u20136 September 2017 (2017)","DOI":"10.15439\/2017F228"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:10:35Z","timestamp":1685459435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}