{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:17:39Z","timestamp":1772907459692,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,17]]},"DOI":"10.1109\/lcnsymposium50271.2020.9363266","type":"proceedings-article","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T21:27:50Z","timestamp":1614720470000},"page":"99-108","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of Container Overlays for Secure Data Sharing"],"prefix":"10.1109","author":[{"given":"Sara","family":"Shakeri","sequence":"first","affiliation":[]},{"given":"Lourens","family":"Veen","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Grosso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485865"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911732"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet47604.2019.9064090"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931762"},{"key":"ref10","article-title":"Calico Routing Modes","year":"2020"},{"key":"ref11","article-title":"Container Networking","year":"2020"},{"key":"ref12","article-title":"Docker overlay networks","year":"2020"},{"key":"ref13","article-title":"Enabling Personal Intervention","year":"2020"},{"key":"ref14","article-title":"Networking","year":"2020"},{"key":"ref15","article-title":"OVN","year":"2020"},{"key":"ref16","article-title":"Prevent DNS (and other) spoofing with Calico","year":"2020"},{"key":"ref17","article-title":"SecurityEnhancedLinux","year":"2020"},{"key":"ref18","article-title":"Use bridge network","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2379646"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.03.011"},{"key":"ref4","article-title":"Flannel","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.012"},{"key":"ref3","article-title":"Docker","year":"2019"},{"key":"ref6","article-title":"iSHARE","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2019.00078"},{"key":"ref5","article-title":"iPerf","year":"2019"},{"key":"ref8","article-title":"Weave Net","year":"2019"},{"key":"ref7","article-title":"Kubernetes","year":"2019"},{"key":"ref2","article-title":"Cilium","year":"2019"},{"key":"ref9","article-title":"AppArmor","year":"2020"},{"key":"ref1","article-title":"Calico","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346917"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.123"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CFEC.2018.8358729"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.01.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00169"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.3009903"}],"event":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","location":"Sydney, Australia","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9363248\/9363249\/09363266.pdf?arnumber=9363266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:38Z","timestamp":1656453278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9363266\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/lcnsymposium50271.2020.9363266","relation":{},"subject":[],"published":{"date-parts":[[2020,11,17]]}}}