{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:11Z","timestamp":1740133271844,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1701681","1717948","1932447"],"award-info":[{"award-number":["1701681","1717948","1932447"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1908020"],"award-info":[{"award-number":["CNS-1908020"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/tnet.2020.3023386","type":"journal-article","created":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T20:24:39Z","timestamp":1600979079000},"page":"2713-2726","source":"Crossref","is-referenced-by-count":2,"title":["SICS: Secure and Dynamic Middlebox Outsourcing"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1769-5799","authenticated-orcid":false,"given":"Huazhe","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-4508","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9721-4923","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4541-6918","authenticated-orcid":false,"given":"Ye","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4196-1508","authenticated-orcid":false,"given":"Hongkun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TC.1986.1676819"},{"year":"2019","journal-title":"2015 data breach investigations report","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/2535828.2535831"},{"year":"2011","author":"goodrich","journal-title":"Introduction to Computer Security","key":"ref32"},{"key":"ref31","first-page":"171","article-title":"Metron:NFV service chains at the true speed of the underlying hardware","author":"katsikas","year":"2018","journal-title":"Proc USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.7717\/peerj-cs.98"},{"year":"2019","journal-title":"Chronology of Data Breaches","key":"ref37"},{"year":"2019","journal-title":"Radioshack Sells Customer Data After Settling With States","key":"ref36"},{"year":"2019","journal-title":"Million After Call Center Employees Stole Customers","key":"ref35"},{"key":"ref34","first-page":"1","article-title":"Bringing practical execution assurances to outsourced middleboxes","author":"yuan","year":"2016","journal-title":"Proc IEEE ICNP"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3185467.3185469"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-540-30576-7_18"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2934872.2934875"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2070562.2070583"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref20","first-page":"456","article-title":"Clickos and the art of network function virtualization","author":"martins","year":"2014","journal-title":"Proc USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICNP.2013.6733614"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2342441.2342452"},{"year":"2019","journal-title":"Service Functrion Chaining","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TNET.2017.2720172"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2342441.2342457"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2716281.2836095"},{"year":"2019","journal-title":"Amazon Virtual Private Cloud","key":"ref50"},{"year":"2019","journal-title":"Data-Plane Development Kit","key":"ref51"},{"year":"2019","journal-title":"Pktgen","key":"ref55"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1145\/2674005.2674994"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1007\/3-540-44676-1_10"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1145\/354871.354874"},{"key":"ref10","article-title":"LightBox: Full-stack protected stateful middlebox at lightning speed","author":"duan","year":"2017","journal-title":"arXiv 1706 06261"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SP.2015.45"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TNET.2017.2720637"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2785956.2787502"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/INFOCOM.2016.7524526"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2486001.2486022"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICNP.2013.6733615"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2876019.2876021"},{"key":"ref17","first-page":"255","article-title":"Embark: Securely outsourcing middleboxes to the cloud","author":"lan","year":"2016","journal-title":"Proc USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2940147.2940150"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2342356.2342427"},{"key":"ref4","first-page":"1","article-title":"Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action, introductory white paper","author":"guerzoni","year":"2012","journal-title":"SDN and OpenFlow World Congress"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2377677.2377680","article-title":"Making middleboxes someone else&#x2019;s problem: Network processing as a cloud service","author":"sherry","year":"2012","journal-title":"Proc ACM Sigcomm"},{"year":"2019","journal-title":"Zscaler Cloud Firewall","key":"ref6"},{"year":"2019","journal-title":"WAN Optimization as-a-Service","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2487726.2488368"},{"year":"2019","journal-title":"Palo alto networks","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1007\/978-3-642-13678-8_3"},{"key":"ref9","first-page":"201","article-title":"Safebricks: Shielding network functions in the cloud","author":"poddar","year":"2018","journal-title":"Proc USENIX NSDI"},{"year":"2019","journal-title":"Header Space Library and NetPlumber","key":"ref46"},{"year":"2009","author":"frahim","journal-title":"Cisco ASA All-in-One Firewall IPS Anti-X VPN Adaptation Security Appliance","key":"ref45"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/2815400.2815423"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1145\/2018436.2018477"},{"year":"2009","author":"pereira","journal-title":"L7 Classification and Policing in the Pfsense Platform","key":"ref42"},{"year":"2004","author":"purdy","journal-title":"Linux iptables Pocket Reference Firewalls NAT & Accounting","key":"ref41"},{"key":"ref44","first-page":"523","article-title":"Maglev: A fast and reliable software network load balancer","author":"eisenbud","year":"2016","journal-title":"Proc USENIX NSDI"},{"year":"2019","journal-title":"The Reliable High Performance TCP\/HTTP Load Balancer","key":"ref43"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9295473\/09205290.pdf?arnumber=9205290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:42:19Z","timestamp":1651070539000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9205290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":55,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2020.3023386","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2020,12]]}}}