{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:46:17Z","timestamp":1757544377787},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,9]]},"DOI":"10.1109\/nfv-sdn53031.2021.9665152","type":"proceedings-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T20:41:14Z","timestamp":1641415274000},"source":"Crossref","is-referenced-by-count":10,"title":["Building a Software Defined Perimeter (SDP) for Network Introspection"],"prefix":"10.1109","author":[{"given":"Michael","family":"Lefebvre","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Suku","family":"Nair","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel W.","family":"Engels","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dwight","family":"Horne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","author":"carver","year":"2016","journal-title":"Method and system for automated incident response"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282382"},{"key":"ref12","year":"2020","journal-title":"WaverleyLabs\/fwknop"},{"key":"ref13","year":"2021","journal-title":"SDPcontroller"},{"key":"ref14","year":"0","journal-title":"Single Packet Authorization A Comprehensive Guide to Strong Service Concealment With FWKNOP"},{"key":"ref15","article-title":"Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing","author":"singh","year":"2020","journal-title":"arXiv 2007 01246 [cs math]"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3377929.3398085"},{"key":"ref17","article-title":"Zero Trust Architecture","author":"horne","year":"2019","journal-title":"Encyclopedia of Cryptography Security and Privacy"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3301305"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800324"},{"key":"ref3","article-title":"Sdp specification 1.0","year":"2014","journal-title":"Cloud Security Alliance (CSA)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12360"},{"key":"ref5","article-title":"Software defined perimeter (sdp) and zero trust","author":"koilpollai","year":"2020","journal-title":"Cloud Security Alliance (CSA)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.37"},{"key":"ref1","first-page":"109","article-title":"A network perimeter with secure external access","author":"avolio","year":"1994","journal-title":"Proceedings of the Internet Society Symposium on Network and Distributed System Security"},{"key":"ref9","article-title":"Software-defined perimeter architecture guide","author":"garbis","year":"2019","journal-title":"Cloud Security Alliance (CSA)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3875"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6662175"}],"event":{"name":"2021 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","location":"Heraklion, Greece","start":{"date-parts":[[2021,11,9]]},"end":{"date-parts":[[2021,11,11]]}},"container-title":["2021 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9664974\/9664998\/09665152.pdf?arnumber=9665152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:51Z","timestamp":1652201811000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9665152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn53031.2021.9665152","relation":{},"subject":[],"published":{"date-parts":[[2021,11,9]]}}}