{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:48:26Z","timestamp":1743115706771,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031096396"},{"type":"electronic","value":"9783031096402"}],"license":[{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-09640-2_6","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:29:41Z","timestamp":1668760181000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secured 5G Network Slices Auction Broker"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o Marques","family":"Silva","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Souto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"6_CR1","unstructured":"5G Service-Guaranteed Network Slicing White Chapter, White chapter, China Mobile Communications Corporation, Huawei Technologies Co., Ltd., Deutsche Telekom AGVolkswagen, February 2017"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Y. Abdulsalam, M.S. Hossain, COVID-19 networking demand: an auction-based mechanism for automated selection of edge computing services. IEEE Trans. Netw. Sci. Eng. (2020). https:\/\/doi.org\/10.1109\/TNSE.2020.3026637","DOI":"10.1109\/TNSE.2020.3026637"},{"key":"6_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842378","volume-title":"Virtualization of Spatial Streams for Enhanced Spectrum Sharing","author":"H Ahmadi","year":"2016","unstructured":"H. Ahmadi et al., Virtualization of Spatial Streams for Enhanced Spectrum Sharing (GLOBECOM, 2016)"},{"key":"6_CR4","unstructured":"N. Archer, J. Gebauer, Managing in the Context of the New Electronic Marketplaces. 1st world congress on the management of electronic commerce, January 19\u201321, Hamilton, ON, Canada (2000)"},{"issue":"106984","key":"6_CR5","first-page":"1","volume":"167","author":"AA Barakabitze","year":"2020","unstructured":"A.A. Barakabitze, A. Ahmad, R. Mijumbi, A. Hines, 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput. Netw. 167(106984), 1\u201340 (2020)","journal-title":"Comput. Netw."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"D.E. Charilas, A.D. Panagopoulos, A survey on game theory applications in wireless networks. Comput. Netw. 54 (2010)","DOI":"10.1016\/j.comnet.2010.06.020"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"X. Chen et al., An auction-based spectrum leasing mechanism for mobile macro-femtocell networks of IoT. Sensors 17 (2017)","DOI":"10.3390\/s17020380"},{"key":"6_CR8","volume-title":"Electronic Purchasing. Arbeitsbericht Nr. 116","author":"K Eyholzer","year":"1999","unstructured":"K. Eyholzer, Electronic Purchasing. Arbeitsbericht Nr. 116 (Institut f\u00fcr Wirtschaftsinformatik, University of Bern, 1999)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Q. Feng, D. He, S. Zeadally, M.K. Khan, N. Kumar, A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45\u201358 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR10","unstructured":"GSMA, Smart 5G Networks: Enabled by Network Slicing and Tailored to Customers\u2019 Needs, https:\/\/www.gsma.com\/futurenetworks\/wp-content\/uploads\/2017\/09\/5G-Network-Slicing-Report.pdf, September 2017"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1109\/COMST.2018.2811395","volume":"20","author":"U Habiba","year":"2018","unstructured":"U. Habiba, E. Hossain, Auction mechanisms for virtualization in 5G cellular networks: basics, trends, and open challenges. IEEE Commun. Surv. Tutor. 20(3), 2264\u20132293 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2811395","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR12","unstructured":"M.A. Habibi et al., The structure of service level agreement of slice-based 5G network. CoRR abs\/1806.10426 (2018)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1109\/PIMRC50174.2021.9569375","volume-title":"2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","author":"T Hewa","year":"2021","unstructured":"T. Hewa, A. Kalla, P. Porambage, M. Liyanage, M. Ylianttila, How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain? in 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (2021), pp. 1525\u20131531. https:\/\/doi.org\/10.1109\/PIMRC50174.2021.9569375"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/ICOIN48656.2020.9016477","volume-title":"2020 International Conference on Information Networking (ICOIN), Barcelona, Spain","author":"DH Kim","year":"2020","unstructured":"D.H. Kim et al., Pricing mechanism for virtualized heterogeneous resources in wireless network virtualization, in 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, (2020), pp. 366\u2013371. https:\/\/doi.org\/10.1109\/ICOIN48656.2020.9016477"},{"issue":"12","key":"6_CR15","doi-asserted-by":"publisher","first-page":"15162","DOI":"10.1109\/TVT.2020.3036470","volume":"69","author":"THT Le","year":"2020","unstructured":"T.H.T. Le et al., Auction mechanism for dynamic bandwidth allocation in multi-tenant edge computing. IEEE Trans. Veh. Technol. 69(12), 15162\u201315176 (2020). https:\/\/doi.org\/10.1109\/TVT.2020.3036470","journal-title":"IEEE Trans. Veh. Technol."},{"key":"6_CR16","volume-title":"Applications of economic and pricing models for resource management in 5G wireless networks: a survey","author":"NC Luong","year":"2018","unstructured":"N. C. Luong et al., \"Applications of economic and pricing models for resource management in 5G wireless networks: a survey.,\" IEEE Commun. Surv. Tutor., 2018."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"J. McMenamy, A. Farhang, N. Marchetti, I. Macaluso, Enhanced Auction-assisted Lsa. ISWCS conference (2016)","DOI":"10.1109\/ISWCS.2016.7600959"},{"key":"6_CR18","volume-title":"Description of Network Slicing Concept","author":"NGMN Alliance","year":"2016","unstructured":"NGMN Alliance, Description of Network Slicing Concept (Public Deliverable, 2016)"},{"key":"6_CR19","unstructured":"D. Ongaro, J. Ousterhout, In Search of an Understandable Consensus Algorithm. USENIX conference (2014)"},{"key":"6_CR20","volume-title":"Business Model Generation","author":"A Osterwalder","year":"2010","unstructured":"A. Osterwalder, Y. Pigneur, Business Model Generation (Wiley, Hoboken, 2010)"},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"T. Salman, M. Zolanvari, A. Erbad, R. Jain, M. Samaka, Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutor. 21(1), 858\u2013880 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"7","key":"6_CR22","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2016.7514161","volume":"54","author":"K Samdanis","year":"2016","unstructured":"K. Samdanis, X. Costa-Perez, V. Sciancalepore, From network sharing to multi-tenancy: the 5G network slice broker. IEEE Commun. Mag. 54(7), 32\u201339 (2016). https:\/\/doi.org\/10.1109\/MCOM.2016.7514161","journal-title":"IEEE Commun. Mag."},{"issue":"2017","key":"6_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.jnca.2017.10.003","volume":"100","author":"Y Sandhya","year":"2017","unstructured":"Y. Sandhya, K. Sinha, Haribabu, A survey: hybrid SDN. J. Netw. Comput. Appl. 100(2017), 35\u201355 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR24","volume-title":"IEEE INFOCOM \u201917","author":"V Sciancalepore","year":"2017","unstructured":"V. Sciancalepore et al., Mobile traffic forecasting for maximizing 5G network slicing resource utilization, in IEEE INFOCOM \u201917, (2017)"},{"issue":"4","key":"6_CR25","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1109\/TNET.2019.2924471","volume":"27","author":"V Sciancalepore","year":"2019","unstructured":"V. Sciancalepore, X. Costa-Perez, A. Banchs, RL-NSB: reinforcement learning-based 5G network slice broker. IEEE\/ACM Trans. Netw. 27(4), 1543\u20131557 (2019). https:\/\/doi.org\/10.1109\/TNET.2019.2924471","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"8","key":"6_CR26","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1109\/JSAC.2019.2927100","volume":"37","author":"YK Tun","year":"2019","unstructured":"Y.K. Tun, N.H. Tran, D.T. Ngo, S.R. Pandey, Z. Han, C.S. Hong, Wireless network slicing: generalized Kelly mechanism-based resource allocation. IEEE J. Sel. Areas Commun. 37(8), 1794\u20131807 (2019). https:\/\/doi.org\/10.1109\/JSAC.2019.2927100","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"L. Zanzi, V.I. Sciancalepore, A. Saavedra, X. P\u00e9rez, OVNES: Demonstrating 5G Network Slicing Overbooking on Real Deployments, IEEE conference on computer communications, Infocom\u201918, Poster and Demo, 2018","DOI":"10.1109\/INFCOMW.2018.8406867"}],"container-title":["Emerging Trends in Cybersecurity Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09640-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T08:15:50Z","timestamp":1689668150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09640-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,19]]},"ISBN":["9783031096396","9783031096402"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09640-2_6","relation":{},"subject":[],"published":{"date-parts":[[2022,11,19]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}