{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:39:45Z","timestamp":1755801585103,"version":"3.44.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/icin.2019.8685843","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T01:09:10Z","timestamp":1555031350000},"page":"72-75","source":"Crossref","is-referenced-by-count":4,"title":["Multi-operator IPC VPN slices: applying RINA to overlay networking"],"prefix":"10.1109","author":[{"given":"Miguel Ponce de","family":"Leon","sequence":"first","affiliation":[{"name":"TSSG, Waterford Institute of Technology"}]},{"given":"Raghu","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Ciena"}]},{"given":"David","family":"Bainbridge","sequence":"additional","affiliation":[{"name":"Ciena"}]},{"given":"Karthick","family":"Ramanarayanan","sequence":"additional","affiliation":[{"name":"Ciena"}]},{"given":"Andy","family":"Corston-Petrie","sequence":"additional","affiliation":[{"name":"BT"}]},{"given":"Eduard Grasa","family":"Fundacio","sequence":"additional","affiliation":[{"name":"i2CAT"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8365"},{"journal-title":"Core information model (core model 1 3 1)","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377265"},{"journal-title":"Patterns in network security An analysis of architectural complexity in securing recursive inter-network architecture networks","year":"2012","author":"small","key":"ref10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544079"},{"journal-title":"Creating ecosystems for end-to-end network slicing (e2ens)","year":"2018","key":"ref11"},{"journal-title":"Threat analysis of recursive internetwork architecture distributed ipc facilities","year":"2012","author":"small","key":"ref8"},{"journal-title":"Irati rina implementation source code","year":"0","key":"ref12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.04.014"},{"journal-title":"Mef 3 0 carrier ethernet","year":"2018","key":"ref2"},{"journal-title":"Ngmn network slicing framework","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510780"}],"event":{"name":"2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","start":{"date-parts":[[2019,2,19]]},"location":"Paris, France","end":{"date-parts":[[2019,2,21]]}},"container-title":["2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8681059\/8685837\/08685843.pdf?arnumber=8685843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:29:29Z","timestamp":1755714569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8685843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icin.2019.8685843","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}