{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:04Z","timestamp":1750221244900,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3229616.3229619","type":"proceedings-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T19:07:07Z","timestamp":1533150427000},"page":"8-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Practical Authentication and Access Control for Software-Defined Networking over Optical Networks"],"prefix":"10.1145","author":[{"given":"Joo Yeon","family":"Cho","sequence":"first","affiliation":[{"name":"ADVA Optical Networking SE, Martinsried, Germany"}]},{"given":"Thomas","family":"Szyrkowiec","sequence":"additional","affiliation":[{"name":"ADVA Optical Networking SE, Martinsried, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sphincs+: Submission to the nist post-quantum project","author":"Bernstein D.","year":"2017","unstructured":"Bernstein , D. , Dobraunig , C. , Eichlseder , M. , Fluhrer , S. , Gazdag , S. , H\u00fclsing , A. , Kampanakis , P. , K\u0151lbl , S. , Lange , T. , Lauridsen , M. , Mendel , F. , Niederhagen , R. , Rechberger , C. , Rijneveld , J. , and Schwabe , P . Sphincs+: Submission to the nist post-quantum project , 2017 . Bernstein, D., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S., H\u00fclsing, A., Kampanakis, P., K\u0151lbl, S., Lange, T., Lauridsen, M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J., and Schwabe, P. Sphincs+: Submission to the nist post-quantum project, 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-662-46800-5_15","volume-title":"Advances in Cryptology -- EUROCRYPT 2015","author":"Bernstein D.","year":"2015","unstructured":"Bernstein , D. , Hopwood , D. , H\u00fclsing , A. , Lange , T. , Niederhagen , R. , Papachristodoulou , L. , Schneider , M. , Schwabe , P. , and Wilcox-O'Hearn , Z. Sphincs: Practical stateless hash-based signatures . In Advances in Cryptology -- EUROCRYPT 2015 ( 2015 ), pp. 368 -- 397 . Bernstein, D., Hopwood, D., H\u00fclsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., and Wilcox-O'Hearn, Z. Sphincs: Practical stateless hash-based signatures. In Advances in Cryptology -- EUROCRYPT 2015 (2015), pp. 368--397."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_5_1","first-page":"66","volume-title":"Selected Areas in Cryptography SAC 2012","volume":"7707","author":"Busold C.","year":"2012","unstructured":"Busold , C. , Buchmann , J. , and H\u00fclsing , A . Forward secure signatures on smart cards . In Selected Areas in Cryptography SAC 2012 ( 2012 ), vol. 7707 , pp. 66 -- 80 . Busold, C., Buchmann, J., and H\u00fclsing, A. Forward secure signatures on smart cards. In Selected Areas in Cryptography SAC 2012 (2012), vol. 7707, pp. 66--80."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8105","volume-title":"Report on post-quantum cryptography","author":"Chen L.","year":"2016","unstructured":"Chen , L. , Jordan , S. , Liu , Y. , Moody , D. , Peralta , R. , Perlner , R. , and Smith-Tone , D. Report on post-quantum cryptography , 2016 . NISTIR 8105. Chen, L., Jordan, S., Liu, Y., Moody, D., Peralta, R., Perlner, R., and Smith-Tone, D. Report on post-quantum cryptography, 2016. NISTIR 8105."},{"key":"e_1_3_2_1_8_1","volume-title":"The International Conference on Digital Information, Networking, and Wireless Communications (DINWC2014)","author":"Dangovas V.","year":"2014","unstructured":"Dangovas , V. , and Kuliesius , F . Sdn-driven authentication and access control system . In The International Conference on Digital Information, Networking, and Wireless Communications (DINWC2014) ( 2014 ). Dangovas, V., and Kuliesius, F. Sdn-driven authentication and access control system. In The International Conference on Digital Information, Networking, and Wireless Communications (DINWC2014) (2014)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_12"},{"key":"e_1_3_2_1_10_1","first-page":"446","volume-title":"2011 Proceedings of the 34th International Convention MIPRO (May","author":"Furdek M.","year":"2011","unstructured":"Furdek , M. , and Skorin-Kapov , N . Physical-layer attacks in all-optical WDM networks . In 2011 Proceedings of the 34th International Convention MIPRO (May 2011 ), pp. 446 -- 451 . Furdek, M., and Skorin-Kapov, N. Physical-layer attacks in all-optical WDM networks. In 2011 Proceedings of the 34th International Convention MIPRO (May 2011), pp. 446--451."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_12_1","volume-title":"March","author":"Gutmann P.","year":"2018","unstructured":"Gutmann , P. Simple certificate enrollment protocol , March 2018 . draft-gutmannscep-10. Gutmann, P. Simple certificate enrollment protocol, March 2018. draft-gutmannscep-10."},{"key":"e_1_3_2_1_13_1","volume-title":"Guide to attribute based access control (ABAC) definition and considerations","author":"Hu V.","year":"2014","unstructured":"Hu , V. , Ferraiolo , D. , Kuhn , R. , Schnitzer , A. , Sandlin , K. , Miller , R. , and Scarfone , K . Guide to attribute based access control (ABAC) definition and considerations , 2014 . NIST Special Publication (SP) 800--162. Hu, V., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., and Scarfone, K. Guide to attribute based access control (ABAC) definition and considerations, 2014. NIST Special Publication (SP) 800--162."},{"key":"e_1_3_2_1_14_1","volume-title":"Internet Engineering Task Force","author":"Huelsing A.","year":"2018","unstructured":"Huelsing , A. , Butin , D. , Gazdag , S. , Rijneveld , J. , and Mohaisen , A . XMSS: Extended Hash-Based Signatures. Internet-Draft draft-irtf-cfrg-xmss-hash-based-signatures-12 , Internet Engineering Task Force , Jan. 2018 . Work in Progress. Huelsing, A., Butin, D., Gazdag, S., Rijneveld, J., and Mohaisen, A. XMSS: Extended Hash-Based Signatures. Internet-Draft draft-irtf-cfrg-xmss-hash-based-signatures-12, Internet Engineering Task Force, Jan. 2018. Work in Progress."},{"key":"e_1_3_2_1_15_1","volume-title":"Summer School on Post-Quantum Cryptography","author":"H\u00fclsing A.","year":"2017","unstructured":"H\u00fclsing , A. Hash-based signatures . Summer School on Post-Quantum Cryptography , Eindhoven, Netherlands , June 2017 . https:\/\/huelsing.files.wordpress.com\/2017\/06\/20170619_pq_summer_school.pdf. H\u00fclsing, A. Hash-based signatures. Summer School on Post-Quantum Cryptography, Eindhoven, Netherlands, June 2017. https:\/\/huelsing.files.wordpress.com\/2017\/06\/20170619_pq_summer_school.pdf."},{"key":"e_1_3_2_1_18_1","volume-title":"SHAKE, Keccak, and sha3sum in rust","author":"Kotewicz M.","year":"2018","unstructured":"Kotewicz , M. A tiny implementation of SHA-3 , SHAKE, Keccak, and sha3sum in rust , 2018 . https:\/\/github.com\/coruus\/keccak-tiny. Kotewicz, M. A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum in rust, 2018. https:\/\/github.com\/coruus\/keccak-tiny."},{"key":"e_1_3_2_1_19_1","first-page":"11","article-title":"Authflow: authentication and access control mechanism for software defined networking","volume":"71","author":"Mattos D.","year":"2016","unstructured":"Mattos , D. , and Duarte , O . Authflow: authentication and access control mechanism for software defined networking . Annals of Telecommunications 71 , 11 ( 2016 ), 607--615. Mattos, D., and Duarte, O. Authflow: authentication and access control mechanism for software defined networking. Annals of Telecommunications 71, 11 (2016), 607--615.","journal-title":"Annals of Telecommunications"},{"key":"e_1_3_2_1_20_1","volume-title":"Hash-based signatures","author":"McGrew D.","year":"2018","unstructured":"McGrew , D. , Curcio , M. , and Fluhrern , S . Hash-based signatures , 2018 . https:\/\/tools.ietf.org\/html\/draft-mcgrew-hash-sigs-10. McGrew, D., Curcio, M., and Fluhrern, S. Hash-based signatures, 2018. https:\/\/tools.ietf.org\/html\/draft-mcgrew-hash-sigs-10."},{"key":"e_1_3_2_1_21_1","first-page":"218","volume-title":"Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989","author":"Merkle R.","year":"1989","unstructured":"Merkle , R. A certified digital signature . In Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989 , Proceedings ( 1989 ), pp. 218 -- 238 . Merkle, R. A certified digital signature. In Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings (1989), pp. 218--238."},{"key":"e_1_3_2_1_22_1","unstructured":"NIST. Secure hash standard (SHS) 2012. FIPS 180--4.  NIST. Secure hash standard (SHS) 2012. FIPS 180--4."},{"key":"e_1_3_2_1_23_1","volume-title":"SHA-3 standard: Permutation-based hash and extendable-output functions","author":"NIST.","year":"2015","unstructured":"NIST. SHA-3 standard: Permutation-based hash and extendable-output functions , 2015 . FIPS 202. NIST. SHA-3 standard: Permutation-based hash and extendable-output functions, 2015. FIPS 202."},{"key":"e_1_3_2_1_24_1","unstructured":"ONOS. Open network operating system 2018. https:\/\/onosproject.org\/.  ONOS. Open network operating system 2018. https:\/\/onosproject.org\/."},{"key":"e_1_3_2_1_25_1","volume-title":"authorization and accounting (AAA) services","author":"OpenDaylight","year":"2004","unstructured":"OpenDaylight . Authentication , authorization and accounting (AAA) services , 2004 . http:\/\/docs.opendaylight.org\/en\/stable-nitrogen\/user-guide\/authentication-and-authorization-services.html#. OpenDaylight. Authentication, authorization and accounting (AAA) services, 2004. http:\/\/docs.opendaylight.org\/en\/stable-nitrogen\/user-guide\/authentication-and-authorization-services.html#."},{"key":"e_1_3_2_1_26_1","volume-title":"Openflow switch specification","author":"OpenFlow","year":"2014","unstructured":"OpenFlow . Openflow switch specification , 2014 . Version 1.5.0, ONF TS- 020. OpenFlow. Openflow switch specification, 2014. Version 1.5.0, ONF TS-020."},{"key":"e_1_3_2_1_27_1","volume-title":"Cryptography and SSL\/TLS toolkit","author":"Open SSL","year":"2018","unstructured":"Open SSL . Cryptography and SSL\/TLS toolkit , 2018 . https:\/\/www.openssl.org\/. OpenSSL. Cryptography and SSL\/TLS toolkit, 2018. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23222"},{"key":"e_1_3_2_1_29_1","volume-title":"March","author":"Rescorla E.","year":"2016","unstructured":"Rescorla , E. The transport layer security (TLS) protocol version 1.3 , March 2016 . Internet-Draft draft-ietf-tls-tls13-12. Rescorla, E. The transport layer security (TLS) protocol version 1.3, March 2016. Internet-Draft draft-ietf-tls-tls13-12."},{"key":"e_1_3_2_1_30_1","volume-title":"Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance","author":"Rogaway P.","year":"2004","unstructured":"Rogaway , P. , and Shrimpton , T . Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance , 2004 . Cryptology ePrint Archive, Report 2004\/035. Rogaway, P., and Shrimpton, T. Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance, 2004. Cryptology ePrint Archive, Report 2004\/035."},{"key":"e_1_3_2_1_31_1","unstructured":"RYU. Component-based software defined networking framework 2018. https:\/\/osrg.github.io\/ryu\/.  RYU. Component-based software defined networking framework 2018. https:\/\/osrg.github.io\/ryu\/."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.41"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229616.3229619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:37Z","timestamp":1750212457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":29,"alternative-id":["10.1145\/3229616.3229619","10.1145\/3229616"],"URL":"https:\/\/doi.org\/10.1145\/3229616.3229619","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}