{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:40Z","timestamp":1750308580649,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3040992.3040995","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:54:21Z","timestamp":1490367261000},"page":"25-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["A First Step Towards Security Extension for NFV Orchestrator"],"prefix":"10.1145","author":[{"given":"Montida","family":"Pattaranantakul","sequence":"first","affiliation":[{"name":"Institut Mines-Telecom\/TELECOM SudParis, and IMT Lille Douai, Institut Mines-Telecom, Lille, Lille, France"}]},{"given":"Yuchia","family":"Tseng","sequence":"additional","affiliation":[{"name":"Paris Descartes University, Paris, France"}]},{"given":"Ruan","family":"He","sequence":"additional","affiliation":[{"name":"Orange Labs, Chatillon, France"}]},{"given":"Zonghua","family":"Zhang","sequence":"additional","affiliation":[{"name":"IMT Lille Douai, Institut Mines-Telecom, Lille, Lille, France"}]},{"given":"Ahmed","family":"Meddahi","sequence":"additional","affiliation":[{"name":"IMT Lille Douai, Institut Mines-Telecom, Lille, Lille, France"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"May","author":"Ain't Markup Langauge YAML","year":"2001","unstructured":"YAML Ain't Markup Langauge . http:\/\/yaml.org\/ , May 2001 . YAML Ain't Markup Langauge. http:\/\/yaml.org\/, May 2001."},{"volume-title":"Jan","year":"2014","key":"e_1_3_2_1_2_1","unstructured":"Cloudnfv. http:\/\/www.cloudnfv.com\/ , Jan 2014 . Cloudnfv. http:\/\/www.cloudnfv.com\/, Jan 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Mar","author":"MANO.","year":"2015","unstructured":"Open MANO. https:\/\/github.com\/nfvlabs\/openmano , Mar 2015 . OpenMANO. https:\/\/github.com\/nfvlabs\/openmano, Mar 2015."},{"volume-title":"Jan","year":"2016","key":"e_1_3_2_1_4_1","unstructured":"OpenBaton. https:\/\/openbaton.github.io\/ , Jan 2016 . OpenBaton. https:\/\/openbaton.github.io\/, Jan 2016."},{"volume-title":"http:\/\/www.tmcnet.com\/redir\/?u=1010632","year":"2014","key":"e_1_3_2_1_5_1","unstructured":"Alcatel-Lucent. Cloudband. http:\/\/www.tmcnet.com\/redir\/?u=1010632 , 2014 . Alcatel-Lucent. Cloudband. http:\/\/www.tmcnet.com\/redir\/?u=1010632, 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940493"},{"key":"e_1_3_2_1_7_1","first-page":"138","volume-title":"Network Virtualization - Opportunities and Challenges for Operators. In FIS'10","author":"Carapinha J.","year":"2010","unstructured":"J. Carapinha Network Virtualization - Opportunities and Challenges for Operators. In FIS'10 , pages 138 -- 147 , 2010 . J. Carapinha et al. Network Virtualization - Opportunities and Challenges for Operators. In FIS'10, pages 138--147, 2010."},{"key":"e_1_3_2_1_8_1","unstructured":"A. Dutta. Security Challenges and Opportunities in SDN\/NFV Networks. http:\/\/www.isr.umd.edu\/sites\/default\/files\/Dutta.pdf Nov 2016.  A. Dutta. Security Challenges and Opportunities in SDN\/NFV Networks. http:\/\/www.isr.umd.edu\/sites\/default\/files\/Dutta.pdf Nov 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"Challenges & Call for Action","author":"Network Functions Virtualization SI.","year":"2012","unstructured":"ET SI. Network Functions Virtualization : An Introduction, Benefits, Enablers , Challenges & Call for Action , Oct 2012 . ETSI. Network Functions Virtualization: An Introduction, Benefits, Enablers, Challenges & Call for Action, Oct 2012."},{"key":"e_1_3_2_1_10_1","unstructured":"ETSI. Network Functions Virtualization (NFV); Management and Orchestration Dec 2014.  ETSI. Network Functions Virtualization (NFV); Management and Orchestration Dec 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"Security and Trust Guidance","author":"Network Functions SI.","year":"2014","unstructured":"ET SI. Network Functions Virtualization (NFV) : NFV Security , Security and Trust Guidance , Dec 2014 . ETSI. Network Functions Virtualization (NFV): NFV Security, Security and Trust Guidance, Dec 2014."},{"key":"e_1_3_2_1_12_1","volume-title":"Security Management and Monitoring for NFV","author":"Network Functions SI.","year":"2015","unstructured":"ET SI. Network Functions Virtualization (NFV) : Security Report , Security Management and Monitoring for NFV , Nov 2015 . ETSI. Network Functions Virtualization (NFV): Security Report, Security Management and Monitoring for NFV, Nov 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963800"},{"volume-title":"May","year":"2014","key":"e_1_3_2_1_15_1","unstructured":"Heat. Heat - Openstack Orchestration. https:\/\/wiki.openstack.org\/wiki\/Heat , May 2014 . Heat. Heat - Openstack Orchestration. https:\/\/wiki.openstack.org\/wiki\/Heat, May 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.514"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6658648"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"e_1_3_2_1_19_1","volume-title":"Apr","author":"OPNFV.","year":"2016","unstructured":"OPNFV. Moon - Security Management Module. https:\/\/wiki.opnfv.org\/display\/moon\/Moon , Apr 2016 . OPNFV. Moon - Security Management Module. https:\/\/wiki.opnfv.org\/display\/moon\/Moon, Apr 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0115"},{"volume-title":"Tacker - OpenStack NFV Orchestration. https:\/\/wiki.openstack.org\/wiki\/Tacker","year":"2013","key":"e_1_3_2_1_21_1","unstructured":"Tacker. Tacker - OpenStack NFV Orchestration. https:\/\/wiki.openstack.org\/wiki\/Tacker , 2013 . Tacker. Tacker - OpenStack NFV Orchestration. https:\/\/wiki.openstack.org\/wiki\/Tacker, 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"Mar","author":"TOSCA.","year":"2016","unstructured":"TOSCA. TOSCA Simple Profile for Network Functions Virtualization (NFV version 1.0) , Mar 2016 . TOSCA. TOSCA Simple Profile for Network Functions Virtualization (NFV version 1.0), Mar 2016."}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3040992.3040995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3040992.3040995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:58Z","timestamp":1750273498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3040992.3040995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":22,"alternative-id":["10.1145\/3040992.3040995","10.1145\/3040992"],"URL":"https:\/\/doi.org\/10.1145\/3040992.3040995","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}