{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:59:37Z","timestamp":1773413977072,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3233251","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Towards a 5G Security Architecture"],"prefix":"10.1145","author":[{"given":"Gregory","family":"Blanc","sequence":"first","affiliation":[{"name":"SAMOVAR, CNRS, T\u00e9l\u00e9com SudParis, Evry, France"}]},{"given":"Nizar","family":"Kheir","sequence":"additional","affiliation":[{"name":"Thales Group, Paris, France"}]},{"given":"Dhouha","family":"Ayed","sequence":"additional","affiliation":[{"name":"Thales Group, Paris, France"}]},{"given":"Vincent","family":"Lefebvre","sequence":"additional","affiliation":[{"name":"Tages SAS, Le Cannet, France"}]},{"given":"Edgardo Montes","family":"de Oca","sequence":"additional","affiliation":[{"name":"Montimage, Paris, France"}]},{"given":"Pascal","family":"Bisson","sequence":"additional","affiliation":[{"name":"Thales Group, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer, 278--286","author":"Ben Mustapha Y.","unstructured":"Y. Ben Mustapha , H. Debar , and G. Blanc . 2014. Policy enforcement point model . In International Conference on Security and Privacy in Communication Systems. Springer, 278--286 . Y. Ben Mustapha, H. Debar, and G. Blanc. 2014. Policy enforcement point model. In International Conference on Security and Privacy in Communication Systems. Springer, 278--286."},{"key":"e_1_3_2_1_7_1","volume-title":"Multi-Provider Secure Virtual Network Embedding. In 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 1--5.","author":"Boutigny F.","unstructured":"F. Boutigny , S. Betg\u00e9-Brezetz , H. Debar , G. Blanc , A. Lavignotte , and I. Popescu . 2018 . Multi-Provider Secure Virtual Network Embedding. In 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 1--5. F. Boutigny, S. Betg\u00e9-Brezetz, H. Debar, G. Blanc, A. Lavignotte, and I. Popescu. 2018. Multi-Provider Secure Virtual Network Embedding. In 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 1--5."},{"key":"e_1_3_2_1_8_1","volume-title":"5G Network Slicing and Security","author":"Dotaro E.","year":"2018","unstructured":"E. Dotaro . 2018. 5G Network Slicing and Security . IEEE Softwarization January ( 2018 ). E. Dotaro. 2018. 5G Network Slicing and Security. IEEE Softwarization January (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_12_1","volume-title":"Estimating VNF Resource Requirements Using Machine Learning Techniques. In International Conference on Neural Information Processing. Springer, 883--892","author":"Jmila H.","unstructured":"H. Jmila , M. Ibn Khedher , and M.A. El Yacoubi . 2017 . Estimating VNF Resource Requirements Using Machine Learning Techniques. In International Conference on Neural Information Processing. Springer, 883--892 . H. Jmila, M. Ibn Khedher, and M.A. El Yacoubi. 2017. Estimating VNF Resource Requirements Using Machine Learning Techniques. In International Conference on Neural Information Processing. Springer, 883--892."},{"key":"e_1_3_2_1_13_1","volume-title":"Cachezoom: How SGX Amplifies the Power of Cache Attacks. In 19th International Conference (CHES). 69--90","author":"Moghimi A.","unstructured":"A. Moghimi , G. Irazoqui , and T. Eisenbarth . 2017 . Cachezoom: How SGX Amplifies the Power of Cache Attacks. In 19th International Conference (CHES). 69--90 . A. Moghimi, G. Irazoqui, and T. Eisenbarth. 2017. Cachezoom: How SGX Amplifies the Power of Cache Attacks. In 19th International Conference (CHES). 69--90."},{"key":"e_1_3_2_1_15_1","volume-title":"Technical Report D2.7. 5G-ENSURE.","author":"Blom R.","year":"2017","unstructured":"R. Blom 2017 . Security Architecture (Final) . Technical Report D2.7. 5G-ENSURE. R. Blom et al. 2017. Security Architecture (Final). Technical Report D2.7. 5G-ENSURE."},{"key":"e_1_3_2_1_16_1","volume-title":"24th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society.","author":"Shih M.","unstructured":"M. Shih , S. Lee , T. Kim , and M. Peinado . 2017. T-SGX: Eradicating Controlled-Channel Attacks against Enclave Programs . In 24th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society. M. Shih, S. Lee, T. Kim, and M. Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks against Enclave Programs. In 24th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233251","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3233251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:51Z","timestamp":1750212471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233251"}},"subtitle":["Articulating Software-Defined Security and Security as a Service"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":10,"alternative-id":["10.1145\/3230833.3233251","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3233251","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}