{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:18:19Z","timestamp":1771478299367,"version":"3.50.1"},"reference-count":11,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["H2020 grant 952647 (AssureMOSS)"],"award-info":[{"award-number":["H2020 grant 952647 (AssureMOSS)"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/msec.2021.3094726","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T20:46:03Z","timestamp":1627418763000},"page":"46-56","source":"Crossref","is-referenced-by-count":29,"title":["Understanding the Security Implications of Kubernetes Networking"],"prefix":"10.1109","volume":"19","author":[{"given":"Francesco","family":"Minna","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, NL"}]},{"given":"Agathe","family":"Blaise","sequence":"additional","affiliation":[{"name":"Thales Group, Paris, France"}]},{"given":"Filippo","family":"Rebecchi","sequence":"additional","affiliation":[{"name":"Thales Group, Paris, France"}]},{"given":"Balakrishnan","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, NL"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1091-8486","authenticated-orcid":false,"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, IT"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120048"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT51068.2021.9418203"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4409-5_9"},{"key":"ref6","first-page":"81","article-title":"BASTION: A security enforcement network stack for container networks","author":"nam","year":"0","journal-title":"Proc USENIX Annu Techn Conf (ATC 2020)"},{"key":"ref11","year":"0","journal-title":"Containers matrix"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2748159"},{"key":"ref8","year":"2021","journal-title":"Secure containerized environments with updated threat matrix for Kubernetes"},{"key":"ref7","year":"0","journal-title":"AssureMOSS Kubernetes Security Testbed"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00025"},{"key":"ref9","year":"0","journal-title":"Kubernetes Documentation"},{"key":"ref1","year":"0","journal-title":"Kubernetes"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9529122\/09497237.pdf?arnumber=9497237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:49:33Z","timestamp":1651780173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9497237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":11,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/msec.2021.3094726","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9]]}}}