{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:56:11Z","timestamp":1725785771658},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/noms59830.2024.10574994","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:23:51Z","timestamp":1719941031000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Integrity Management in Softwarized Networks"],"prefix":"10.1109","author":[{"given":"Enrico","family":"Bravi","sequence":"first","affiliation":[{"name":"Politecnico di Torino,Dip. Automatica e Informatica,Torino,Italy"}]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Dip. Automatica e Informatica,Torino,Italy"}]},{"given":"Diana Gratiela","family":"Berbecaru","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Dip. Automatica e Informatica,Torino,Italy"}]}],"member":"263","reference":[{"volume-title":"SDN and OpenFlow World Congress","article-title":"Network Functions Virtualisation: An Introduction, Benefits, Enablers, Challenges & Call for Action","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s10207-011-0124-7"},{"year":"2004","author":"Brandl","article-title":"Trusted computing: The TCG Trusted Platform Module specification","key":"ref3"},{"year":"2018","article-title":"Hardware Requirements for a Device Identifier Composition Engine","key":"ref4"},{"year":"2023","article-title":"Measurement and Attestation RootS (MARS) Library Specification","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.23919\/splitech58164.2023.10193517"},{"year":"2016","article-title":"ETSI GR NFV-SEC 003 V1.2.1: Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance","key":"ref7"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9334","article-title":"Remote ATtestation procedureS (RATS) Architecture","volume-title":"RFC-9334","author":"Birkholz","year":"2023"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/netsoft.2019.8806655"},{"volume-title":"TCG White Paper","year":"2011","article-title":"TPM main part 1 design principles","key":"ref11"},{"year":"2014","article-title":"Trusted Computing Group Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2","key":"ref12"},{"year":"2021","article-title":"Protection Profile PC Client Specific TPM Library Specification Family 2.0","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/trustcom.2015.357"},{"year":"2016","author":"Costan","article-title":"Intel SGX explained","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3291047"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1095810.1095812"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/SECPRI.2004.1301329"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3098243.3098261"},{"key":"ref20","first-page":"1","article-title":"SMART: Secure and Minimal Architecture for (establishing dynamic) Root of Trust","volume-title":"NDSS-2012: 19th Annual Network and Distributed System Security Symposium","author":"El Defrawy"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/comst.2014.2330903"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/comst.2015.2453114"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/secon.2018.8479121"},{"year":"2019","article-title":"Network Functions Virtualisation (NFV); Security; Report on NFV Remote Attestation Architecture","key":"ref24"},{"volume-title":"Presentation at the IETF","author":"Ersue","article-title":"ETSI NFV management and orchestration - An overview","key":"ref25"},{"key":"ref26","article-title":"Use of Trusted Computing Techniques to Counteract Cyber-security Attacks in Critical Infrastructures","volume-title":"MSc Thesis","author":"Bravi","year":"2022"},{"volume-title":"The Quart project","key":"ref27"},{"volume-title":"The Quart project","key":"ref28"},{"volume-title":"The Apache Kafka Project","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/2991079.2991104"},{"key":"ref31","article-title":"TPM 2.0-based Attestation of a Kubernetes Cluster","volume-title":"MSc Thesis","author":"Piras","year":"2022"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0067"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/978-3-642-35795-4_25"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/comst.2020.3008879"},{"year":"2021","article-title":"Intel\u00ae Trust Domain Extensions","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3342195.3387532"}],"event":{"name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2024,5,6]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,5,10]]}},"container-title":["NOMS 2024-2024 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574855\/10574897\/10574994.pdf?arnumber=10574994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T04:49:47Z","timestamp":1720241387000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10574994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/noms59830.2024.10574994","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}