{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:20:03Z","timestamp":1774023603135,"version":"3.50.1"},"reference-count":118,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100020912","name":"King Faisal University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020912","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10207-024-00900-5","type":"journal-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T09:02:44Z","timestamp":1724144564000},"page":"3569-3589","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security"],"prefix":"10.1007","volume":"23","author":[{"given":"Abdulrahman K.","family":"Alnaim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,20]]},"reference":[{"key":"900_CR1","doi-asserted-by":"publisher","first-page":"3750","DOI":"10.3390\/S22103750","volume":"22","author":"AK Alnaim","year":"2022","unstructured":"Alnaim, A.K., Alwakeel, A.M., Fernandez, E.B.: Towards a security reference architecture for NFV. Sensors 22, 3750 (2022). https:\/\/doi.org\/10.3390\/S22103750","journal-title":"Sensors"},{"key":"900_CR2","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Hamid, B.: A pattern for network functions virtualization. In: 20th European Conference on Pattern Languages of Programs\u2014EuroPLoP \u201915, pp. 1\u20139. ACM Press, Kaufbeuren, Germany, New York, USA (2015)","DOI":"10.1145\/2855321.2855369"},{"key":"900_CR3","unstructured":"ETSI: Network Functions Virtualisation (NFV); Architectural Framework (2014). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV\/001_099\/002\/01.02.01_60\/gs_NFV002v010 1p.pdf"},{"key":"900_CR4","unstructured":"ETSI: Network Functions Virtualisation (NFV); Infrastructure; Hypervisor Domain (2015). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFVINF\/001_099\/004\/01.01.01_60\/gs_nfv-inf004v010101p.pdf"},{"key":"900_CR5","unstructured":"ETSI: Network Functions Virtualisation (NFV); Virtual Network Functions Architecture (2014). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFVSWA\/001_099\/001\/01.01.01_60\/gs_NFV-SWA001v010101p.pdf"},{"key":"900_CR6","doi-asserted-by":"crossref","unstructured":"Alnaim, A.K., Alwakeel, A.M., Fernandez, E.B.: A pattern for an NFV virtual machine environment. In: 13th Annual IEEE International Systems Conference. IEEE, Orlando, FL, Florida (2019)","DOI":"10.1109\/SYSCON.2019.8836847"},{"key":"900_CR7","unstructured":"ETSI: Network Functions Virtualization (NFV); Management and Orchestration (2014). https:\/\/www.etsi.org\/deliver\/etsi_gs\/nfvman\/001_099\/001\/01.01.01_60\/gs_nfv-man001v010101p.pdf"},{"key":"900_CR8","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/J.JNCA.2016.09.001","volume":"75","author":"D Bhamare","year":"2016","unstructured":"Bhamare, D., Jain, R., Samaka, M., Erbad, A.: A survey on service function chaining. J. Netw. Comput. Appl. 75, 138\u2013155 (2016). https:\/\/doi.org\/10.1016\/J.JNCA.2016.09.001","journal-title":"J. Netw. Comput. Appl."},{"key":"900_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2022.109281","volume":"217","author":"K Kaur","year":"2022","unstructured":"Kaur, K., Mangat, V., Kumar, K.: A review on virtualized infrastructure managers with management and orchestration features in NFV architecture. Comput. Netw. 217, 109281 (2022). https:\/\/doi.org\/10.1016\/J.COMNET.2022.109281","journal-title":"Comput. Netw."},{"key":"900_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2022.109484","volume":"221","author":"M Pattaranantakul","year":"2023","unstructured":"Pattaranantakul, M., Vorakulpipat, C., Takahashi, T.: Service function chaining security survey: addressing security challenges and threats. Comput. Netw. 221, 109484 (2023). https:\/\/doi.org\/10.1016\/J.COMNET.2022.109484","journal-title":"Comput. Netw."},{"key":"900_CR11","unstructured":"ETSI: Network Functions Virtualisation (NFV) Release 3. Network Service Templates Specification, Management and Orchestration (2019). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFVIFA\/001_099\/014\/03.03.01_60\/gs_NFVIFA014v030301p.pdf"},{"key":"900_CR12","unstructured":"Open Networking Foundation (2014) SDN Architecture"},{"key":"900_CR13","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/J.JKSUCI.2020.03.001","volume":"34","author":"BK Tripathy","year":"2022","unstructured":"Tripathy, B.K., Sahoo, K.S., Luhach, A.K., et al.: A virtual execution platform for OpenFlow controller using NFV. J. King Saud Univ. Comput. Inf. Sci. 34, 964\u2013971 (2022). https:\/\/doi.org\/10.1016\/J.JKSUCI.2020.03.001","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"900_CR14","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","volume":"18","author":"R Mijumbi","year":"2016","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J.L., et al.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18, 236\u2013262 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2477041","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"900_CR15","doi-asserted-by":"publisher","first-page":"127276","DOI":"10.1109\/ACCESS.2019.2938534","volume":"7","author":"N Hassan","year":"2019","unstructured":"Hassan, N., Yau, K.L.A., Wu, C.: Edge computing in 5G: a review. IEEE Access 7, 127276\u2013127289 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2938534","journal-title":"IEEE Access"},{"key":"900_CR16","unstructured":"Ting, T.H., Lin, T.N., Shen, S.H., Chang, Y.W.: Guidelines for 5G end to end architecture and security issues (2019). arXiv preprint arXiv:1912.10318"},{"key":"900_CR17","first-page":"1","volume":"28","author":"S Kekki","year":"2018","unstructured":"Kekki, S., Featherstone, W., Fang, Y., Kuure, P., Li, A., Ranjan, A., Scarpina, S.: MEC in 5G networks. ETSI white paper 28, 1\u201328 (2018)","journal-title":"ETSI white paper"},{"key":"900_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2022.109358","volume":"217","author":"K Ramezanpour","year":"2022","unstructured":"Ramezanpour, K., Jagannath, J.: Intelligent zero trust architecture for 5G\/6G networks: principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Netw. 217, 109358 (2022). https:\/\/doi.org\/10.1016\/J.COMNET.2022.109358","journal-title":"Comput. Netw."},{"key":"900_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2019.106984","volume":"167","author":"AA Barakabitze","year":"2020","unstructured":"Barakabitze, A.A., Ahmad, A., Mijumbi, R., Hines, A.: 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput. Netw. 167, 106984 (2020). https:\/\/doi.org\/10.1016\/J.COMNET.2019.106984","journal-title":"Comput. Netw."},{"key":"900_CR20","doi-asserted-by":"publisher","first-page":"99999","DOI":"10.1109\/ACCESS.2020.2997702","volume":"8","author":"RF Olimid","year":"2020","unstructured":"Olimid, R.F., Nencioni, G.: 5G network slicing: a security overview. IEEE Access 8, 99999\u2013100009 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2997702","journal-title":"IEEE Access"},{"key":"900_CR21","volume-title":"Pattern-Oriented Software Architecture Volume 1: A System of Patterns","author":"F Buschmann","year":"1996","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., et al.: Pattern-Oriented Software Architecture Volume 1: A System of Patterns. Wiley, Hoboken (1996)"},{"key":"900_CR22","volume-title":"Security Patterns in Practice: Designing Secure Architectures using Software Patterns","author":"EB Fernandez","year":"2013","unstructured":"Fernandez, E.B.: Security Patterns in Practice: Designing Secure Architectures using Software Patterns. Wiley, Hoboken (2013)"},{"key":"900_CR23","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/J.CSI.2015.02.011","volume":"41","author":"AV Uzunov","year":"2015","unstructured":"Uzunov, A.V., Fernandez, E.B., Falkner, K.: ASE: a comprehensive pattern-driven security methodology for distributed systems. Comput Stand Interfaces 41, 112\u2013137 (2015). https:\/\/doi.org\/10.1016\/J.CSI.2015.02.011","journal-title":"Comput Stand Interfaces"},{"key":"900_CR24","volume-title":"Software Architecture: Foundations, Theory, and Practice","author":"RN Taylor","year":"2010","unstructured":"Taylor, R.N., Nenad, Medvidovi\u0107, Dashofy, E.M., Eric, M.: Software Architecture: Foundations, Theory, and Practice. Wiley, Hoboken (2010)"},{"key":"900_CR25","doi-asserted-by":"publisher","first-page":"22466","DOI":"10.1109\/ACCESS.2018.2827419","volume":"6","author":"G Arfaoui","year":"2018","unstructured":"Arfaoui, G., Bisson, P., Blom, R., et al.: A security architecture for 5G networks. IEEE Access 6, 22466\u201322479 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2827419","journal-title":"IEEE Access"},{"key":"900_CR26","volume-title":"Object Oriented Software Engineering: Practical Software Development Using UML and Java","author":"TC Lethbridge","year":"2004","unstructured":"Lethbridge, T.C., Lagani\u00e8re, R.: Object Oriented Software Engineering: Practical Software Development Using UML and Java. McGraw Hill, Chicago (2004)"},{"key":"900_CR27","unstructured":"ETSI: Network Functions Virtualization (NFV) Use Cases (2021)"},{"key":"900_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5\/TABLES\/4","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1\u201313 (2013). https:\/\/doi.org\/10.1186\/1869-0238-4-5\/TABLES\/4","journal-title":"J. Internet Serv. Appl."},{"key":"900_CR29","doi-asserted-by":"publisher","unstructured":"Alwakeel, A.M., Alnaim, A.K., Fernandez, E.B.: A survey of network function virtualization security. In: SoutheastCon. St. Petersburg, FL, USA (2018) pp. 1-8. https:\/\/doi.org\/10.1109\/SECON.2018.8479121","DOI":"10.1109\/SECON.2018.8479121"},{"key":"900_CR30","unstructured":"Common Vulnerabilities and Exposures (CVE).: https:\/\/www.cve.org\/. Accessed 23 Apr 2023"},{"key":"900_CR31","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/J.CSI.2013.12.008","volume":"36","author":"AV Uzunov","year":"2014","unstructured":"Uzunov, A.V., Fernandez, E.B.: An extensible pattern-based library and taxonomy of security threats for distributed systems. Comput. Stand. Interfaces 36, 734\u2013747 (2014). https:\/\/doi.org\/10.1016\/J.CSI.2013.12.008","journal-title":"Comput. Stand. Interfaces"},{"issue":"12","key":"900_CR32","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.3390\/ELECTRONICS11121819","volume":"11","author":"MNI Farooqui","year":"2022","unstructured":"Farooqui, M.N.I., Arshad, J., Khan, M.M.: A layered approach to threat modeling for 5G-based systems. Electronics 11(12), 1819 (2022). https:\/\/doi.org\/10.3390\/ELECTRONICS11121819","journal-title":"Electronics"},{"key":"900_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2021.108288","volume":"197","author":"T Madi","year":"2021","unstructured":"Madi, T., Alameddine, H.A., Pourzandi, M., Boukhtouta, A.: NFV security survey in 5G networks: a three-dimensional threat taxonomy. Comput. Netw. 197, 108288 (2021). https:\/\/doi.org\/10.1016\/J.COMNET.2021.108288","journal-title":"Comput. Netw."},{"key":"900_CR34","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/TRUSTCOM.2016.0115","volume":"2016","author":"M Pattaranantakul","year":"2016","unstructured":"Pattaranantakul, M., He, R., Meddahi, A., Zhang, Z.: SecMANO: towards network functions virtualization (NFV) based security MANagement and orchestration. IEEE Trustcom\/BigDataSE\/ISPA 2016, 598\u2013605 (2016). https:\/\/doi.org\/10.1109\/TRUSTCOM.2016.0115","journal-title":"IEEE Trustcom\/BigDataSE\/ISPA"},{"key":"900_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S40860-022-00171-8","volume":"2022","author":"Y Maleh","year":"2022","unstructured":"Maleh, Y., Qasmaoui, Y., El Gholami, K., et al.: A comprehensive survey on SDN security: threats, mitigations, and future directions. J. Reliab. Intell. Environ. 2022, 1\u201339 (2022). https:\/\/doi.org\/10.1007\/S40860-022-00171-8","journal-title":"J. Reliab. Intell. Environ."},{"key":"900_CR36","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"key":"900_CR37","doi-asserted-by":"crossref","unstructured":"Shaghaghi, A., Kaafar, M.A., Buyya, R., Jha, S.: Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Principles and Paradigms, Handbook of Computer Networks and Cyber Security, pp. 341\u2013387 (2019)","DOI":"10.1007\/978-3-030-22277-2_14"},{"key":"900_CR38","doi-asserted-by":"crossref","unstructured":"Fahmin, A., Lai, Y.C., Hossain, M.S., et al.: Performance modeling of SDN with NFV under or aside the controller. In: Proceedings\u20142017 5th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2017. Institute of Electrical and Electronics Engineers Inc., pp. 211\u2013216 (2017)","DOI":"10.1109\/FiCloudW.2017.76"},{"key":"900_CR39","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","volume":"55","author":"J Ordonez-Lucena","year":"2017","unstructured":"Ordonez-Lucena, J., Ameigeiras, P., Di, Lopez, et al.: Network slicing for 5G with SDN\/NFV: concepts, architectures, and challenges. IEEE Commun. Mag. 55, 80\u201387 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600935","journal-title":"IEEE Commun. Mag."},{"key":"900_CR40","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M.V., Verissimo, P.E., et al.: Software-defined networking: a comprehensive survey. Proc. IEEE 103, 14\u201376 (2015). https:\/\/doi.org\/10.1109\/JPROC.2014.2371999","journal-title":"Proc. IEEE"},{"key":"900_CR41","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MSP.2018.3761717","volume":"16","author":"D Kreutz","year":"2018","unstructured":"Kreutz, D., Yu, J., Esteves-Verissimo, P., et al.: The KISS principle in software-defined networking: a framework for secure communications. IEEE Secur. Priv. 16, 60\u201370 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.3761717","journal-title":"IEEE Secur. Priv."},{"key":"900_CR42","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N.: The challenges in ML-based security for SDN. In: 2018 2nd Cyber Security in Networking Conference, CSNet 2018. Institute of Electrical and Electronics Engineers Inc (2019)","DOI":"10.1109\/CSNET.2018.8602680"},{"key":"900_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/J.JNCA.2020.102595","volume":"159","author":"JC Correa Chica","year":"2020","unstructured":"Correa Chica, J.C., Imbachi, J.C., Botero Vega, J.F.: Security in SDN: a comprehensive survey. J. Netw. Comput. Appl. 159, 102595 (2020). https:\/\/doi.org\/10.1016\/J.JNCA.2020.102595","journal-title":"J. Netw. Comput. Appl."},{"key":"900_CR44","unstructured":"OpenStack: Accelerating NFV Delivery with OpenStack\u2014Global Telecoms Align Around Open Source Networking Future (2016). https:\/\/objectstorage-ca-ymq-1.vexxhost.net\/swift\/v1\/6e4619c416ff4bd19e1c087f27a43eea\/wwwassets-prod\/telecoms-and-nfv\/OpenStack-Foundation-NFV-Report.pdf"},{"key":"900_CR45","doi-asserted-by":"crossref","unstructured":"Alwakeel, A.M., Alnaim, A.K., Fernandez, E.B.: Analysis of threats and countermeasures in NFV use cases. In: SysCon 2019\u201413th Annual IEEE International Systems Conference. Institute of Electrical and Electronics Engineers Inc., Orlando, FL, USA (2019)","DOI":"10.1109\/SYSCON.2019.8836849"},{"key":"900_CR46","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOMSTD.2018.1700072","volume":"2","author":"A Kaloxylos","year":"2018","unstructured":"Kaloxylos, A.: A survey and an analysis of network slicing in 5G networks. IEEE Commun. Stand. Mag. 2, 60\u201365 (2018). https:\/\/doi.org\/10.1109\/MCOMSTD.2018.1700072","journal-title":"IEEE Commun. Stand. Mag."},{"key":"900_CR47","doi-asserted-by":"crossref","unstructured":"Yoo, T.: Network slicing architecture for 5G network. In: 2016 International Conference on Information and Communication Technology Convergence, ICTC 2016 1010\u20131014 (2016). https:\/\/doi.org\/10.1109\/ICTC.2016.7763354","DOI":"10.1109\/ICTC.2016.7763354"},{"key":"900_CR48","doi-asserted-by":"crossref","unstructured":"Chatras, B., Tsang Kwong, U.S., Bihannic, N.: NFV enabling network slicing for 5G. In: Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Institute of Electrical and Electronics Engineers Inc., Paris, France, pp. 219\u2013225 (2017)","DOI":"10.1109\/ICIN.2017.7899415"},{"key":"900_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S13638-021-01959-7\/FIGURES\/10","volume":"2021","author":"I Badmus","year":"2021","unstructured":"Badmus, I., Laghrissi, A., Matinmikko-Blue, M., Pouttu, A.: End-to-end network slice architecture and distribution across 5G micro-operator leveraging multi-domain and multi-tenancy. EURASIP J. Wirel. Commun. Netw. 2021, 1\u201323 (2021). https:\/\/doi.org\/10.1186\/S13638-021-01959-7\/FIGURES\/10","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"900_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S11432-017-9426-4\/METRICS","volume":"61","author":"X Ji","year":"2018","unstructured":"Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology. Sci. China Inf. Sci. 61, 1\u201325 (2018). https:\/\/doi.org\/10.1007\/S11432-017-9426-4\/METRICS","journal-title":"Sci. China Inf. Sci."},{"key":"900_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2022.109515","volume":"221","author":"K Ramezanpour","year":"2023","unstructured":"Ramezanpour, K., Jagannath, J., Jagannath, A.: Security and privacy vulnerabilities of 5G\/6G and WiFi 6: survey and research directions from a coexistence perspective. Comput. Netw. 221, 109515 (2023). https:\/\/doi.org\/10.1016\/J.COMNET.2022.109515","journal-title":"Comput. Netw."},{"key":"900_CR52","doi-asserted-by":"publisher","first-page":"190822","DOI":"10.1109\/ACCESS.2020.3031966","volume":"8","author":"J Suomalainen","year":"2020","unstructured":"Suomalainen, J., Juhola, A., Shahabuddin, S., et al.: Machine learning threatens 5G security. IEEE Access 8, 190822\u2013190842 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3031966","journal-title":"IEEE Access"},{"key":"900_CR53","doi-asserted-by":"crossref","unstructured":"Alnaim, A.K., Alwakeel, A.M., Fernandez, E.B.: A misuse pattern for compromising VMs via virtual machine escape in NFV. In: 14th International Conference on Availability, Reliability and Security (ARES 2019), pp. 1\u20136. ACM, Canterbury, United Kingdom, UK (2019)","DOI":"10.1145\/3339252.3340530"},{"key":"900_CR54","unstructured":"Alnaim, A.K., Alwakeel, A.M., Fernandez, E.B.: A misuse pattern for NFV based on privilege escalation. In: 8th Asian Conference on Pattern Languages of Programs. ACM, Tokyo, Japan, Japan (2019)"},{"key":"900_CR55","unstructured":"Alnaim, A.K., Alwakeel, A.M., Fernandez, E.B.: A misuse pattern for distributed denial-of-service attack in network function virtualization. In: PLoP \u201919: pattern languages of programs conference, pp. 1\u201310. ACM, Ottawa, Ontario, Canada, Ontario, Canada (2019)"},{"key":"900_CR56","doi-asserted-by":"publisher","first-page":"201","DOI":"10.3390\/FI14070201","volume":"14","author":"AK Alnaim","year":"2022","unstructured":"Alnaim, A.K.: Misuse patterns from the threat of modification of non-control data in network function virtualization. Futur. Internet 14, 201 (2022). https:\/\/doi.org\/10.3390\/FI14070201","journal-title":"Futur. Internet"},{"key":"900_CR57","unstructured":"Alcatel-Lucent: Providing Security in NFV Challenges and Opportunities (2014). https:\/\/www.tmcnet.com\/tmc\/whitepapers\/documents\/whitepapers\/2014\/10172-providing-security-nfv.pdf"},{"key":"900_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S40064-016-2257-7\/FIGURES\/10","volume":"5","author":"J Shi","year":"2016","unstructured":"Shi, J., Yang, Y., Tang, C.: Hardware assisted hypervisor introspection. Springerplus 5, 1\u201323 (2016). https:\/\/doi.org\/10.1186\/S40064-016-2257-7\/FIGURES\/10","journal-title":"Springerplus"},{"key":"900_CR59","unstructured":"OpenStack. https:\/\/www.openstack.org\/. Accessed 23 Apr 2023"},{"key":"900_CR60","doi-asserted-by":"crossref","unstructured":"Basile, C., Lioy, A., Pitscheider, C., et al.: A novel approach for integrating security policy enforcement with dynamic network virtualization. In: 1st IEEE Conference on Network Softwarization: Software-Defined Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015. Institute of Electrical and Electronics Engineers Inc (2015)","DOI":"10.1109\/NETSOFT.2015.7116152"},{"key":"900_CR61","doi-asserted-by":"crossref","unstructured":"Giotis, K., Kryftis, Y., Maglaris, V.: Policy-based orchestration of NFV services in Software-Defined Networks. In: 1st IEEE Conference on Network Softwarization: Software-Defined Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015. Institute of Electrical and Electronics Engineers Inc (2015)","DOI":"10.1109\/NETSOFT.2015.7116145"},{"key":"900_CR62","doi-asserted-by":"crossref","unstructured":"Jaeger, B.: Security orchestrator: introducing a security orchestrator in the context of the ETSI NFV reference architecture. In: Proceedings\u201414th IEEE international conference on trust, security and privacy in computing and communications, TrustCom 1:1255\u20131260 (2015). https:\/\/doi.org\/10.1109\/TRUSTCOM.2015.514","DOI":"10.1109\/Trustcom.2015.514"},{"key":"900_CR63","doi-asserted-by":"crossref","unstructured":"Makaya, C., Freimuth, D., Wood, D., Calo, S.: Policy-based NFV management and orchestration. In: 2015 IEEE Conference on Network Function Virtualization and Software Defined Network, NFV-SDN 2015. Institute of Electrical and Electronics Engineers Inc., pp. 128\u2013134 (2016)","DOI":"10.1109\/NFV-SDN.2015.7387417"},{"key":"900_CR64","doi-asserted-by":"crossref","unstructured":"Pattaranantakul, M., Tseng, Y., He, R., et al.: A first step towards security extension for NFV orchestrator. In: the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization. Association for Computing Machinery, Inc, pp 25\u201330 (2017)","DOI":"10.1145\/3040992.3040995"},{"key":"900_CR65","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TNET.2011.2178431","volume":"20","author":"C Basile","year":"2012","unstructured":"Basile, C., Cappadonia, A., Lioy, A.: Network-level access control policy analysis and transformation. IEEE\/ACM Trans. Netw. 20, 985\u2013998 (2012). https:\/\/doi.org\/10.1109\/TNET.2011.2178431","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"900_CR66","doi-asserted-by":"crossref","unstructured":"Saatkamp, K., Krieger, C., Leymann, F., et al.: Application threat modeling and automated VNF selection for mitigation using TOSCA. In: 2019 International Conference on Networked Systems, NetSys 2019. Institute of Electrical and Electronics Engineers Inc (2019)","DOI":"10.1109\/NetSys.2019.8854524"},{"key":"900_CR67","doi-asserted-by":"crossref","unstructured":"Smine, M., Espes, D., Cuppens-Boulahia, N., Cuppens, F.: Network functions virtualization access control as a service. In: DBSec: IFIP Annual Conference on Data and Applications Security and Privacy. Springer, pp 100\u2013117 (2020)","DOI":"10.1007\/978-3-030-49669-2_6"},{"key":"900_CR68","volume-title":"Computer Security","author":"D Gollmann","year":"2010","unstructured":"Gollmann, D.: Computer Security. Wiley, Hoboken (2010)"},{"key":"900_CR69","doi-asserted-by":"crossref","unstructured":"Smine, M., Espes, D., Pahl, M.O.: Optimal access control deployment in network function virtualization. In: IEEE\/IFIP Network Operations and Management Symposium 2022: Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022. Institute of Electrical and Electronics Engineers Inc (2022)","DOI":"10.1109\/NOMS54207.2022.9789911"},{"key":"900_CR70","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TNET.2019.2895278","volume":"27","author":"C Basile","year":"2019","unstructured":"Basile, C., Valenza, F., Lioy, A., et al.: Adding support for automatic enforcement of security policies in NFV networks. IEEE\/ACM Trans. Netw. 27, 707\u2013720 (2019). https:\/\/doi.org\/10.1109\/TNET.2019.2895278","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"900_CR71","unstructured":"Fabien.: OrBAC: organization based access control | the official OrBAC model website (2013). https:\/\/web.archive.org\/web\/20180809181607\/http:\/\/orbac.org\/. Accessed 30 Sep 2023"},{"key":"900_CR72","doi-asserted-by":"crossref","unstructured":"Tripathy, B.K., Sethy, A.G., Bera, P., Rahman, M.A.: A novel secure and efficient policy management framework for software defined network. In: International Computer Software and Applications Conference. IEEE Computer Society, pp. 423\u2013430 (2016)","DOI":"10.1109\/COMPSAC.2016.31"},{"key":"900_CR73","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/69.277771","volume":"6","author":"EB Fernandez","year":"1994","unstructured":"Fernandez, E.B., Gudes, E., Song, H.: A model for evaluation and administration of security in object-oriented databases. IEEE Trans. Knowl. Data Eng. 6, 275\u2013292 (1994). https:\/\/doi.org\/10.1109\/69.277771","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"900_CR74","doi-asserted-by":"crossref","unstructured":"Porras, P., Cheung, S., Fong, M., et al.: Securing the software-defined network control layer. In: 2015 Network and Distributed System Security Symposium (2015)","DOI":"10.14722\/ndss.2015.23222"},{"key":"900_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4236\/JCC.2021.97001","volume":"9","author":"J Xu","year":"2021","unstructured":"Xu, J., Xu, J.: Research on cyberspace mimic defense based on dynamic heterogeneous redundancy mechanism. J. Comput. Commun. 9, 1\u20137 (2021). https:\/\/doi.org\/10.4236\/JCC.2021.97001","journal-title":"J. Comput. Commun."},{"key":"900_CR76","unstructured":"ETSI 3GPP TS 33.501 (2022) 5G; Security Architecture and Procedures for 5G System, V. 17.7.0"},{"key":"900_CR77","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOMSTD.0005.2200055","volume":"7","author":"RM Dhanasekaran","year":"2023","unstructured":"Dhanasekaran, R.M., Ping, J., Gomez, G.P.: End-to-end network slicing security across standards organizations. IEEE Commun. Stand. Mag. 7, 40\u201347 (2023). https:\/\/doi.org\/10.1109\/MCOMSTD.0005.2200055","journal-title":"IEEE Commun. Stand. Mag."},{"key":"900_CR78","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0306-4379(79)90017-6","volume":"4","author":"C Wood","year":"1979","unstructured":"Wood, C., Summers, R.C., Fernandez, E.B.: Authorization in multilevel database models. Inf. Syst. 4, 155\u2013161 (1979). https:\/\/doi.org\/10.1016\/0306-4379(79)90017-6","journal-title":"Inf. Syst."},{"key":"900_CR79","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/J.COMCOM.2021.03.024","volume":"172","author":"G Peinado Gomez","year":"2021","unstructured":"Peinado Gomez, G., Mongay Batalla, J., Miche, Y., et al.: Security policies definition and enforcement utilizing policy control function framework in 5G. Comput. Commun. 172, 226\u2013237 (2021). https:\/\/doi.org\/10.1016\/J.COMCOM.2021.03.024","journal-title":"Comput. Commun."},{"key":"900_CR80","doi-asserted-by":"publisher","first-page":"8094","DOI":"10.3390\/S21238094","volume":"21","author":"J Ordonez-Lucena","year":"2021","unstructured":"Ordonez-Lucena, J., Ameigeiras, P., Contreras, L.M., et al.: On the rollout of network slicing in carrier networks: a technology radar. Sensors 21, 8094 (2021). https:\/\/doi.org\/10.3390\/S21238094","journal-title":"Sensors"},{"key":"900_CR81","doi-asserted-by":"publisher","first-page":"2","DOI":"10.23919\/ETR.2021.9904691","volume":"2021","author":"J Olsson","year":"2022","unstructured":"Olsson, J., Shorov, A., Abdelrazek, L., Whitefield, J.: 5G zero trust\u2014a zero-trust architecture for telecom. Ericsson Technol. Rev. 2021, 2\u201311 (2022). https:\/\/doi.org\/10.23919\/ETR.2021.9904691","journal-title":"Ericsson Technol. Rev."},{"key":"900_CR82","unstructured":"ETSI: Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance (2014). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFVSEC\/001_099\/003\/01.01.01_60\/gs_NFV-SEC003v010101p.pdf"},{"key":"900_CR83","unstructured":"ENISA.: NFV Security in 5G\u2014Challenges and Best Practices (2022)"},{"key":"900_CR84","doi-asserted-by":"crossref","unstructured":"Fernandez EB, Pernul G (2006) Patterns for session-based access control. In: PLoP 2006\u2014PLoP Pattern Languages of Programs 2006 Conference","DOI":"10.1145\/1415472.1415482"},{"key":"900_CR85","doi-asserted-by":"crossref","unstructured":"Basin, D., Radomirovic, S., Dreier, J., et al.: A formal analysis of 5g authentication. In: ACM Conference on Computer and Communications Security. Association for Computing Machinery, pp. 1383\u20131396 (2018)","DOI":"10.1145\/3243734.3243846"},{"key":"900_CR86","unstructured":"Canada, B., Erfanian, J., Smith, B.B., et al.: Network Functions Virtualisation\u2014White Paper on NFV priorities for 5G. ETSI White Paper 1\u201315 (2017)"},{"key":"900_CR87","doi-asserted-by":"crossref","unstructured":"Paladi, N., Karlsson, L.: Safeguarding VNF credentials with intel SGX. In: 2017 SIGCOMM Posters and Demos. Association for Computing Machinery, Inc, pp. 144\u2013146 (2017)","DOI":"10.1145\/3123878.3132016"},{"key":"900_CR88","doi-asserted-by":"publisher","first-page":"235","DOI":"10.13052\/JICTS2245-800X.834","volume":"8","author":"B Ravichandran","year":"2020","unstructured":"Ravichandran, B.: Securing virtual network function (VNF) in telco cloud. J. ICT Stand. 8, 235\u2013246 (2020). https:\/\/doi.org\/10.13052\/JICTS2245-800X.834","journal-title":"J. ICT Stand."},{"key":"900_CR89","unstructured":"ETSI 3GPP TS 28(533), pp. 5G,: Management and orchestration. Archit. Framew. 17, 2 (2022)"},{"key":"900_CR90","unstructured":"ETSI: Network Functions Virtualization (NFV). Report on Retained Data problem statement and requirements, NFV Security (2016)"},{"key":"900_CR91","unstructured":"ETSI (2015) Network Functions Virtualization (NFV); Resiliency Requirements"},{"key":"900_CR92","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Yoshioka, N., Washizaki, H.: Patterns for security and privacy in cloud ecosystems. In: 2nd International Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2015. Institute of Electrical and Electronics Engineers Inc., pp. 13\u201318 (2015)","DOI":"10.1109\/ESPRE.2015.7330162"},{"key":"900_CR93","unstructured":"Liu, G., Sadok, H., Kohlbrenner, A., et al.: Don\u2019t yank my chain: auditable nf service chaining. In: 18th USENIX Symposium on Networked Systems Design and Implementation. pp. 155\u2013173 (2021)"},{"key":"900_CR94","unstructured":"ETSI: Network Functions Virtualisation (NFV). Cataloguing Security Features in Management Software, NFV Security (2015)"},{"key":"900_CR95","doi-asserted-by":"crossref","unstructured":"Gonzalez, A.J., Ordonez-Lucena, J., Helvik, B.E., et al.: The isolation concept in the 5G network slicing. In: 2020 European Conference on Networks and Communications, EuCNC 2020. Institute of Electrical and Electronics Engineers Inc., pp. 12\u201316 (2020)","DOI":"10.1109\/EuCNC48522.2020.9200939"},{"key":"900_CR96","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","volume":"20","author":"I Afolabi","year":"2018","unstructured":"Afolabi, I., Taleb, T., Samdanis, K., et al.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 20, 2429\u20132453 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2815638","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"900_CR97","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.3045381","volume":"18","author":"T Zhang","year":"2021","unstructured":"Zhang, T., Qiu, H., Linguaglossa, L., et al.: NFV platforms: taxonomy, design choices and future challenges. IEEE Trans. Netw. Serv. Manag. 18, 30\u201348 (2021). https:\/\/doi.org\/10.1109\/TNSM.2020.3045381","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"900_CR98","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MNET.001.1800072","volume":"33","author":"I Afolabi","year":"2019","unstructured":"Afolabi, I., Taleb, T., Frangoudis, P.A., et al.: Network slicing-based customization of 5G mobile services. IEEE Netw. 33, 134\u2013141 (2019). https:\/\/doi.org\/10.1109\/MNET.001.1800072","journal-title":"IEEE Netw."},{"key":"900_CR99","unstructured":"Palo Alto Networks What is 5G Security? 5G security explained"},{"key":"900_CR100","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, pp. 18\u201333 (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"900_CR101","doi-asserted-by":"publisher","DOI":"10.2139\/SSRN.4210104","author":"EB Fernandez","year":"2022","unstructured":"Fernandez, E.B., Brazhuk, A.: A critical analysis of zero trust architecture (Zta). SSRN Electron. J. (2022). https:\/\/doi.org\/10.2139\/SSRN.4210104","journal-title":"SSRN Electron. J."},{"key":"900_CR102","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3178760","author":"B Ali","year":"2022","unstructured":"Ali, B., Hijjawi, S., Campbell, L.H., et al.: A maturity framework for zero-trust security in multiaccess edge computing. Secur. Commun. Netw. (2022). https:\/\/doi.org\/10.1155\/2022\/3178760","journal-title":"Secur. Commun. Netw."},{"key":"900_CR103","doi-asserted-by":"publisher","first-page":"18706","DOI":"10.1109\/ACCESS.2021.3053233","volume":"9","author":"B Ali","year":"2021","unstructured":"Ali, B., Gregory, M.A., Li, S.: Multi-access edge computing architecture, data security and privacy: a review. IEEE Access 9, 18706\u201318721 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3053233","journal-title":"IEEE Access"},{"key":"900_CR104","doi-asserted-by":"crossref","unstructured":"Kim, S.l., Kim, H.S.: Semantic ontology-based NFV service modeling. In: International Conference on Ubiquitous and Future Networks, ICUFN. IEEE Computer Society, pp. 674\u2013678 (2018)","DOI":"10.1109\/ICUFN.2018.8436738"},{"key":"900_CR105","doi-asserted-by":"crossref","unstructured":"Rodrigues, B., Bocek, T., Stiller, B.: Multi-domain DDoS mitigation based on blockchains. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, pp. 185\u2013190 (2017)","DOI":"10.1007\/978-3-319-60774-0_19"},{"key":"900_CR106","doi-asserted-by":"crossref","unstructured":"Mishra, R.A., Kalla, A., Shukla, K., et al.: B-VNF: blockchain-enhanced architecture for VNF orchestration in MEC-5G networks. In: 2020 IEEE 3rd 5G world forum. Institute of Electrical and Electronics Engineers Inc., pp. 229\u2013234 (2020)","DOI":"10.1109\/5GWF49715.2020.9221075"},{"key":"900_CR107","doi-asserted-by":"crossref","unstructured":"Villagr\u00e1n-Velasco, O., Fern\u00e1ndez, E.B., Ortega-Arjona, J.: Refining the evaluation of the degree of security of a system built using security patterns. In: 5th International Conference on Availability, Reliability and Security (ARES 2020). Association for Computing Machinery, Dublin, Ireland (2020)","DOI":"10.1145\/3407023.3407070"},{"key":"900_CR108","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/J.COSE.2012.11.007","volume":"33","author":"M Montanari","year":"2013","unstructured":"Montanari, M., Chan, E., Larson, K., et al.: Distributed security policy conformance. Comput. Secur. 33, 28\u201340 (2013). https:\/\/doi.org\/10.1016\/J.COSE.2012.11.007","journal-title":"Comput. Secur."},{"key":"900_CR109","doi-asserted-by":"crossref","unstructured":"Esteves-Verissimo, P., Volp, M,. Decouchant, J., et al.: Meeting the challenges of critical and extreme dependability and security. In: IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. IEEE Computer Society, pp. 92\u201397 (2017)","DOI":"10.1109\/PRDC.2017.21"},{"key":"900_CR110","unstructured":"Garc\u00e9s, L., Sena, B., Nakagawa, E.Y.: Towards an architectural patterns language for systems-of-systems. In: 26th Conference on Pattern Languages of Programs (PLoP). Ottawa, ON (2019)"},{"key":"900_CR111","doi-asserted-by":"publisher","unstructured":"Hawilo, H., Jammal, M., Shami, A.: Exploring microservices as the architecture of choice for network function virtualization platforms. IEEE Netw. 33, 202\u2013210 (2019). https:\/\/doi.org\/10.1109\/MNET.2019.1800023","DOI":"10.1109\/MNET.2019.1800023"},{"key":"900_CR112","doi-asserted-by":"publisher","unstructured":"Porambage, P., Gur, G., Osorio, D.P.M., Liyanage, M., Gurtov, A., Ylianttila, M.: The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2, 1094\u20131122 (2021). https:\/\/doi.org\/10.1109\/OJCOMS.2021.3078081","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"900_CR113","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/JIOT.2023.3297241","volume":"11","author":"W Khalid","year":"2024","unstructured":"Khalid, W., Rehman, M.A.U., Van Chien, T., Kaleem, Z., Lee, H., Yu, H.: Reconfigurable intelligent surface for physical layer security in 6G-IoT: designs, issues, and advances. IEEE Internet Things J. 11, 3599\u20133613 (2024). https:\/\/doi.org\/10.1109\/JIOT.2023.3297241","journal-title":"IEEE Internet Things J."},{"key":"900_CR114","unstructured":"5G Americas: Evolving 5G Security for the Cloud. (2022)"},{"key":"900_CR115","unstructured":"Hattar, M.: Great power or great vulnerability? Securing 5G and 6G networks. https:\/\/www.securityweek.com\/great-power-or-great-vulnerability-securing-5g-and-6g-networks\/"},{"key":"900_CR116","unstructured":"Thales.: Virtualized Networks and Real Risks: Best Practices for Securing Network Function Virtualization Environment (2022)"},{"issue":"2","key":"900_CR117","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCOM.001.2100408","volume":"60","author":"L Bondan","year":"2022","unstructured":"Bondan, L., Wauter, T., Volckaert, B., De Turck, F., Granville, L.Z.: NFV anomaly detection: case study through a security module. IEEE Commun. Mag. 60(2), 18\u201324 (2022). https:\/\/doi.org\/10.1109\/MCOM.001.2100408","journal-title":"IEEE Commun. Mag."},{"key":"900_CR118","doi-asserted-by":"crossref","unstructured":"Yang, W., Fung, C.: A survey on security in network functions virtualization. In: 2016 IEEE NetSoft Conference and Workshops (NetSoft) (pp. 15\u201319). IEEE (2016). https:\/\/doi.org\/10.1109\/NETSOFT.2016.7502434","DOI":"10.1109\/NETSOFT.2016.7502434"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00900-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00900-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00900-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T01:05:26Z","timestamp":1728695126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00900-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":118,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["900"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00900-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"20 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing or financial interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}