{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:03:50Z","timestamp":1746857030691,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/netsoft.2015.7116152","type":"proceedings-article","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:33:14Z","timestamp":1433950394000},"page":"1-5","source":"Crossref","is-referenced-by-count":34,"title":["A novel approach for integrating security policy enforcement with dynamic network virtualization"],"prefix":"10.1109","author":[{"given":"Cataldo","family":"Basile","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Pitscheider","sequence":"additional","affiliation":[]},{"given":"Fulvio","family":"Valenza","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vallini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"437","article-title":"Ontology-based security policy translation","volume":"5","author":"basile","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"ref11","first-page":"595","article-title":"A model-driven approach for securing software architectures","author":"neri","year":"2013","journal-title":"SECRYPT2013 10th International Conference on Security and Cryp-tography"},{"key":"ref12","article-title":"Developing a Security Policy","author":"weise","year":"2003","journal-title":"SANS Institute Tech Rep"},{"key":"ref13","article-title":"Your Security Policy is What?","author":"bishop","year":"2006","journal-title":"Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2002.1015622"},{"year":"2013","key":"ref15","article-title":"PoSecCo deliverable D2.2 - it policy meta-model and language"},{"year":"2012","key":"ref16","article-title":"PoSecCo deliverable D3.5 - models to refine the it policy at service level"},{"key":"ref17","article-title":"eXtensible Access Control Markup Language (XACML) Version 3.0","author":"godik","year":"2013","journal-title":"Organization for the Advancement of Structured Information Standards Tech Rep"},{"year":"2012","key":"ref18","article-title":"PoSecCo deliverable D3.3 - configuration meta-model"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2013.6798428"},{"key":"ref3","first-page":"459","article-title":"Clickos and the art of network function virtualization","author":"martins","year":"2014","journal-title":"USENIX Symposium on Networked System Design and Implementation NSDI"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.122"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-642-02080-3_15","article-title":"VXDL: virtual resources and interconnection networks description language","volume":"2","author":"koslovski","year":"2009","journal-title":"Networks for Grid Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2005.28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1035582.1035583"},{"journal-title":"The European Telecommunications Standards Institute Tech Rep","article-title":"Network function virtualization - White Paper 2","year":"2013","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/49.257932"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-642-19348-4_15","article-title":"Mirage: A management tool for the analysis and deployment of network security policies","volume":"6514","author":"garcia-alfaro","year":"2011","journal-title":"Data Privacy Management and Autonomous Spontaneous Security"}],"event":{"name":"2015 IEEE Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2015,4,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,4,17]]}},"container-title":["Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7111753\/7116113\/07116152.pdf?arnumber=7116152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T09:23:33Z","timestamp":1498209813000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7116152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2015.7116152","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}