{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T05:06:46Z","timestamp":1725253606935},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T00:00:00Z","timestamp":1696377600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T00:00:00Z","timestamp":1696377600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,4]]},"DOI":"10.1109\/nof58724.2023.10302812","type":"proceedings-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T17:47:46Z","timestamp":1698947266000},"source":"Crossref","is-referenced-by-count":1,"title":["Security policy architecture for 5G Networks"],"prefix":"10.1109","author":[{"given":"Wassim Mohamed La\u00efd","family":"Koribeche","sequence":"first","affiliation":[{"name":"Institute of Research and Technology b&#x003C;&#x003E;com,France"}]},{"given":"David","family":"Espes","sequence":"additional","affiliation":[{"name":"Institute of Research and Technology b&#x003C;&#x003E;com,France"}]},{"given":"C\u00e9dric","family":"Morin","sequence":"additional","affiliation":[{"name":"Institute of Research and Technology b&#x003C;&#x003E;com,France"}]}],"member":"263","reference":[{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"key":"ref9","article-title":"Static Conflict Detection for a Policy Language","author":"trou","year":"2015","journal-title":"Vingt-sixi&#x00E8;mes Journ&#x00E9;es Francophones des Langages Applicatifs (JFLA 2015)"},{"key":"ref4","year":"2019","journal-title":"Zero-Touch Network and Service Management (ZSM) Reference Architecture Version 1 1 1"},{"key":"ref3","year":"2014","journal-title":"Network Functions Virtualisation (NFV) Management and Orchestration version 1 1 1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719844710"},{"key":"ref5","first-page":"94","article-title":"WP 3, T3.1 Security enablers,smart and adaptive security","author":"lefebvre","year":"2019"},{"key":"ref10","author":"vallini","year":"2015","journal-title":"SECURED EU FP7 project deliverable D4 1 Policy specification"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.104.2100495"},{"key":"ref1","article-title":"Alejandro Molina Zarca Jorge Bernal Bernab&#x00E9;","year":"2017","journal-title":"Anastacia EU project D2 1 Policy-based Definition and Policy for Orchestration Initial Report"}],"event":{"name":"2023 14th International Conference on Network of the Future (NoF)","location":"Izmir, Turkiye","start":{"date-parts":[[2023,10,4]]},"end":{"date-parts":[[2023,10,6]]}},"container-title":["2023 14th International Conference on Network of the Future (NoF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10302728\/10302750\/10302812.pdf?arnumber=10302812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:33:21Z","timestamp":1701113601000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10302812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,4]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/nof58724.2023.10302812","relation":{},"subject":[],"published":{"date-parts":[[2023,10,4]]}}}