{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:03:59Z","timestamp":1770818639531,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/EU.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/netsoft.2019.8806667","type":"proceedings-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T23:44:37Z","timestamp":1566517477000},"page":"281-285","source":"Crossref","is-referenced-by-count":17,"title":["5G-SSAAC: Slice-specific Authentication and Access Control in 5G"],"prefix":"10.1109","author":[{"given":"Shanay","family":"Behrad","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Bertin","sequence":"additional","affiliation":[]},{"given":"Sephane","family":"Tuffin","sequence":"additional","affiliation":[]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Deliverable D2.1 Use Cases","year":"2016","journal-title":"5G Ensure Project"},{"key":"ref11","article-title":"Security Architecture","year":"2018","journal-title":"TS 33 401 Tech Spec V15 5 0"},{"key":"ref12","article-title":"Remote Provisioning Architecture for Embedded UICC","year":"2016","journal-title":"Tech Spec V3 1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788919"},{"key":"ref15","article-title":"Service requirements for Machine-Type Communications (MTC)","year":"2017","journal-title":"TS 22 368 Tech Spec V14 0 1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCRI.2016.15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2495321"},{"key":"ref18","first-page":"1017","article-title":"A group-based authentication and key agreement for MTC in LTE networks","author":"cao","year":"2012","journal-title":"Global Communications Conference (GLOBECOM) 2012 IEEE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.08.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref6","article-title":"System Architecture for the 5G System","year":"2018","journal-title":"TS 23 501 Tech Spec V15 3 0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406135"},{"key":"ref7","article-title":"Security architecture and procedures for 5G system","year":"2018","journal-title":"TS 33 501 Tech Spec V15 2 0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref1","article-title":"Deliverable D2.7 Security Architecture (Final)","year":"2017","journal-title":"5G Ensure Project"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5220\/0005996203600367"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306673"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815418"},{"key":"ref24","article-title":"Medium Access Control (MAC) protocol","year":"2018","journal-title":"TS 36 321 Tech Spec V15 3 0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2366300"}],"event":{"name":"2019 IEEE Conference on Network Softwarization (NetSoft)","location":"Paris, France","start":{"date-parts":[[2019,6,24]]},"end":{"date-parts":[[2019,6,28]]}},"container-title":["2019 IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8792325\/8806619\/08806667.pdf?arnumber=8806667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:16Z","timestamp":1658155516000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8806667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2019.8806667","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}