{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T09:07:54Z","timestamp":1749028074010},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1109\/netsoft54395.2022.9844023","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T19:34:09Z","timestamp":1659555249000},"page":"284-286","source":"Crossref","is-referenced-by-count":2,"title":["Towards Application-Aware Provisioning of Security Services with Kubernetes"],"prefix":"10.1109","author":[{"given":"Roberto","family":"Doriguzzi-Corin","sequence":"first","affiliation":[{"name":"Cybersecurity, Fondazione Bruno Kessler,Italy"}]},{"given":"Silvio","family":"Cretti","sequence":"additional","affiliation":[{"name":"Cybersecurity, Fondazione Bruno Kessler,Italy"}]},{"given":"Tiziana","family":"Catena","sequence":"additional","affiliation":[{"name":"University of Roma Sapienza,DIET department,Italy"}]},{"given":"Simone","family":"Magnani","sequence":"additional","affiliation":[{"name":"Cybersecurity, Fondazione Bruno Kessler,Italy"}]},{"given":"Domenico","family":"Siracusa","sequence":"additional","affiliation":[{"name":"Cybersecurity, Fondazione Bruno Kessler,Italy"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169861"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2941128"},{"key":"ref10","article-title":"Service Function Chaining Across Open-stack and Kubernetes Domains","author":"kouchaksaraei","year":"2019","journal-title":"Proc of the ACM DEBS"},{"year":"2022","key":"ref6","article-title":"The istio service mesh"},{"year":"2022","key":"ref11","article-title":"Network service mesh"},{"year":"2022","key":"ref5","article-title":"Kubernetes"},{"year":"2022","key":"ref8","article-title":"Nginx reverse proxy"},{"year":"2022","key":"ref7","article-title":"The netfilter.org project"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107981"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165338"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"}],"event":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2022,6,27]]},"location":"Milan, Italy","end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE 8th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9844017\/9844019\/09844023.pdf?arnumber=9844023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:02:29Z","timestamp":1661198549000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9844023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/netsoft54395.2022.9844023","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]}}}