{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:39:57Z","timestamp":1763105997503,"version":"3.37.3"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100021856","name":"European Union - NextGenerationEU under the Italian Ministry of University and Research (MUR) National Innovation Ecosystem","doi-asserted-by":"publisher","award":["ECS00000041 (VITALITY)"],"award-info":[{"award-number":["ECS00000041 (VITALITY)"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"MUR Extended Partnerships","doi-asserted-by":"publisher","award":["PE0000001 (RESTART)"],"award-info":[{"award-number":["PE0000001 (RESTART)"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2024.3367461","type":"journal-article","created":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T20:24:18Z","timestamp":1708374258000},"page":"1276-1298","source":"Crossref","is-referenced-by-count":7,"title":["Attribute-Based Management of Secure Kubernetes Cloud Bursting"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6695-5956","authenticated-orcid":false,"given":"Mauro","family":"Femminella","sequence":"first","affiliation":[{"name":"Department of Engineering, University of Perugia, Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4037-3701","authenticated-orcid":false,"given":"Martina","family":"Palmucci","sequence":"additional","affiliation":[{"name":"Consortium GARR, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8567-5917","authenticated-orcid":false,"given":"Gianluca","family":"Reali","sequence":"additional","affiliation":[{"name":"Department of Engineering, University of Perugia, Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4216-8912","authenticated-orcid":false,"given":"Mattia","family":"Rengo","sequence":"additional","affiliation":[{"name":"Department of Engineering, University of Perugia, Perugia, Italy"}]}],"member":"263","reference":[{"volume-title":"Amazon Elastic Kubernetes Service (Amazon EKS)","year":"2023","key":"ref1"},{"volume-title":"Google Kubernetes Engine","year":"2023","key":"ref2"},{"volume-title":"Ibm Kubernetes Service","year":"2023","key":"ref3"},{"volume-title":"Module aw11 rabe","year":"2024","key":"ref4"},{"volume-title":"Oracle Cloud Native Services\u2014Container Engine for Kubernetes","year":"2023","key":"ref5"},{"volume-title":"Security best practices for Kubernetes deployment","year":"2019","key":"ref6"},{"volume-title":"Anthos","year":"2023","key":"ref7"},{"volume-title":"Cloud- Native Applications Protection Platform","year":"2023","key":"ref8"},{"volume-title":"Configuration best practices: Using labels","year":"2023","key":"ref9"},{"volume-title":"Configuring Cloudbees Build Acceleration for Agent Cloud Bursting","year":"2023","key":"ref10"},{"volume-title":"Kubernetes autoscaler","year":"2023","key":"ref11"},{"volume-title":"Securing Kubernetes Workloads In Hybrid Settings With Aporeto","year":"2023","key":"ref12"},{"volume-title":"TLS-Enabled Kubernetes Clusters With ACM Private CA and Amazon EKS","year":"2023","key":"ref13"},{"volume-title":"Virtual kubelet","year":"2023","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2751471"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/info13020060"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1094342019877383"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3226644"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/percomworkshops53856.2022.9767437"},{"volume-title":"Meet rocket","year":"2024","author":"Benitez","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103482"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4108\/eetsc.v6i18.1197"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2890784"},{"volume-title":"Best Practices: Kubernetes Security\u2014Coordinate Across Identity, Network, and Container Security to Protect K8S","year":"2023","author":"Carielli","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771724"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3539606"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3043950"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3325996"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3240000"},{"volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council","year":"2016","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63058-4_8"},{"volume-title":"Hybrid Kubernetes model: Bridging clouds and on-premises","year":"2017","author":"Ghosh","key":"ref37"},{"volume-title":"The evolution of Kubernetes clusters in multicloud and hybrid cloud","year":"2023","author":"Ghosh","key":"ref38"},{"volume-title":"Cloud bursting with virtual kubelet and KIP (kloud instance provider)","year":"2020","author":"Gocul","key":"ref39"},{"key":"ref40","first-page":"361","article-title":"Seagull: Intelligent cloud bursting for enterprise applications","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Guo"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3234210"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275294"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239579"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.052"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.procs.2015.07.208","article-title":"A work in progress: Context based encryption scheme for Internet of Things","volume":"56","author":"Lee","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2520932"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3208149"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111271"},{"volume-title":"Introduction to Azure Kubernetes Service (AKS)","year":"2023","key":"ref50"},{"key":"ref51","article-title":"Too many options: A survey of abe libraries for developers","author":"Mosteiro-Sanchez","year":"2022","journal-title":"arXiv:2209.12742"},{"volume-title":"Lecture notes in secret sharing","year":"2012","author":"Padro","key":"ref52"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3523181.3523191"},{"volume-title":"Project onehundredten: Cloud bursting approaches based on Kubernetes","year":"2023","author":"Rengo","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09607-7"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-021-09570-2"},{"volume-title":"Simplify your hybrid\/multi-cluster, multi-cloud Kubernetes deployments with KubeSlice","year":"2022","author":"Ronan","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864300"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/icaccs54159.2022.9785124"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-020-00194-7"},{"volume-title":"Role-Based Access Control Vs. Attribute-Based Access Control","year":"2023","author":"Touw","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-022-01093-5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.03.081"},{"volume-title":"Enhancing Self-Created Kubernetes With Cloud Elasticity to Cope With Traffic Bursts","year":"2023","author":"Zhuang","key":"ref67"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/10362961\/10440131.pdf?arnumber=10440131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:10:21Z","timestamp":1709860221000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10440131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3367461","relation":{},"ISSN":["2644-125X"],"issn-type":[{"type":"electronic","value":"2644-125X"}],"subject":[],"published":{"date-parts":[[2024]]}}}