{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:51Z","timestamp":1750221051023,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T00:00:00Z","timestamp":1542240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,15]]},"DOI":"10.1145\/3286062.3286086","type":"proceedings-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T13:09:55Z","timestamp":1542028195000},"page":"162-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["We don't need no licensing server"],"prefix":"10.1145","author":[{"given":"Puneet","family":"Sharma","sequence":"first","affiliation":[{"name":"Hewlett Packard Enterprise"}]},{"given":"Arun","family":"Raghuramu","sequence":"additional","affiliation":[{"name":"Forescout Technologies Inc. and Hewlett Packard Labs"}]},{"given":"David","family":"Lee","sequence":"additional","affiliation":[{"name":"Hewlett Packard Enterprise"}]},{"given":"Vinay","family":"Saxena","sequence":"additional","affiliation":[{"name":"Hewlett Packard Enterprise"}]},{"given":"Chen-Nee","family":"Chuah","sequence":"additional","affiliation":[{"name":"UC Davis"}]}],"member":"320","published-online":{"date-parts":[[2018,11,15]]},"reference":[{"unstructured":"Amazon web services marketplace. https:\/\/https:\/\/aws.amazon.com\/marketplace.  Amazon web services marketplace. https:\/\/https:\/\/aws.amazon.com\/marketplace.","key":"e_1_3_2_1_1_1"},{"unstructured":"Google cloud platform marketplace. https:\/\/cloud.google.com\/marketplace\/.  Google cloud platform marketplace. https:\/\/cloud.google.com\/marketplace\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"System and methods for enforcing software license compliance with virtual machines. https:\/\/patents.google.com\/patent\/US8875266B2\/en.  System and methods for enforcing software license compliance with virtual machines. https:\/\/patents.google.com\/patent\/US8875266B2\/en.","key":"e_1_3_2_1_3_1"},{"unstructured":"Wibu systems: Codemeter. https:\/\/www.wibu.com\/us\/blog\/article\/secure-licensing-for-tpm-connected-devices.html.  Wibu systems: Codemeter. https:\/\/www.wibu.com\/us\/blog\/article\/secure-licensing-for-tpm-connected-devices.html.","key":"e_1_3_2_1_4_1"},{"unstructured":"Ibm x3650 m2 specifications 2009. http:\/\/www-07.ibm.com\/systems\/includes\/content\/x\/pdf\/prod_guide.pdf.  Ibm x3650 m2 specifications 2009. http:\/\/www-07.ibm.com\/systems\/includes\/content\/x\/pdf\/prod_guide.pdf.","key":"e_1_3_2_1_5_1"},{"unstructured":"Trusted computing group tpm specification 2011. https:\/\/trustedcomputinggroup.org\/tpm-main-specification\/.  Trusted computing group tpm specification 2011. https:\/\/trustedcomputinggroup.org\/tpm-main-specification\/.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"us8818900 b2","author":"Distributed","year":"2014","unstructured":"Distributed license management , us8818900 b2 , 2014 . Distributed license management, us8818900 b2, 2014."},{"unstructured":"Etsi nfv security problem statement 2014. http:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/001\/01.01.01_60\/gs_NFV-SEC001v010101p.pdf.  Etsi nfv security problem statement 2014. http:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/001\/01.01.01_60\/gs_NFV-SEC001v010101p.pdf.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"ep2913771 a1","author":"Cluster","year":"2015","unstructured":"Cluster license server , ep2913771 a1 , 2015 . Cluster license server, ep2913771 a1, 2015."},{"unstructured":"Hard truths about software licensing for nfv 2015. http:\/\/blog.advaoptical.com\/hard-truths-about-software-licensing-for-nfv.  Hard truths about software licensing for nfv 2015. http:\/\/blog.advaoptical.com\/hard-truths-about-software-licensing-for-nfv.","key":"e_1_3_2_1_10_1"},{"unstructured":"Openstack ceilometer 2015. http:\/\/docs.openstack.org\/developer\/ceilometer\/.  Openstack ceilometer 2015. http:\/\/docs.openstack.org\/developer\/ceilometer\/.","key":"e_1_3_2_1_11_1"},{"unstructured":"The openstack congress framework 2015. http:\/\/docs.openstack.org\/developer\/congress\/README.html.  The openstack congress framework 2015. http:\/\/docs.openstack.org\/developer\/congress\/README.html.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Compliance and enforcement","author":"Bsa","year":"2016","unstructured":"Bsa : Compliance and enforcement , 2016 . http:\/\/www.bsa.org\/anti-piracy. Bsa: Compliance and enforcement, 2016. http:\/\/www.bsa.org\/anti-piracy."},{"unstructured":"Dell poweredge r720 specifications 2016. http:\/\/www.dell.com\/downloads\/global\/products\/pedge\/dell-poweredge-r720-spec-sheet.pdf.  Dell poweredge r720 specifications 2016. http:\/\/www.dell.com\/downloads\/global\/products\/pedge\/dell-poweredge-r720-spec-sheet.pdf.","key":"e_1_3_2_1_14_1"},{"unstructured":"Etsi nfv license management work item 2016. https:\/\/portal.etsi.org\/webapp\/WorkProgram\/Report_WorkItem.asp?WKI_ID=50639.  Etsi nfv license management work item 2016. https:\/\/portal.etsi.org\/webapp\/WorkProgram\/Report_WorkItem.asp?WKI_ID=50639.","key":"e_1_3_2_1_15_1"},{"unstructured":"Hp proliant dl360p specifications 2016. https:\/\/www.hpe.com\/h20195\/v2\/GetPDF.aspx\/c04123167.pdf.  Hp proliant dl360p specifications 2016. https:\/\/www.hpe.com\/h20195\/v2\/GetPDF.aspx\/c04123167.pdf.","key":"e_1_3_2_1_16_1"},{"unstructured":"Limits on running containers on a docker host 2016. http:\/\/stackoverflow.com\/questions\/21799382\/is-there-a-maximum-number-of-containers\\discretionary{-}{}{}running-on-a-docker-host.  Limits on running containers on a docker host 2016. http:\/\/stackoverflow.com\/questions\/21799382\/is-there-a-maximum-number-of-containers\\discretionary{-}{}{}running-on-a-docker-host.","key":"e_1_3_2_1_17_1"},{"unstructured":"The machine- memory driven computing 2017. https:\/\/www.labs.hpe.com\/the-machine.  The machine- memory driven computing 2017. https:\/\/www.labs.hpe.com\/the-machine.","key":"e_1_3_2_1_18_1"},{"unstructured":"Network operator perspectives on nfv priorities for 5g 2017. https:\/\/portal.etsi.org\/NFV\/NFV_White_Paper_5G.pdf.  Network operator perspectives on nfv priorities for 5g 2017. https:\/\/portal.etsi.org\/NFV\/NFV_White_Paper_5G.pdf.","key":"e_1_3_2_1_19_1"},{"unstructured":"Openstack tacker 2017. https:\/\/github.com\/openstack\/tacker.  Openstack tacker 2017. https:\/\/github.com\/openstack\/tacker.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Nfv license management","author":"Tm","year":"2017","unstructured":"Tm forum exploratory report : Nfv license management , 2017 . https:\/\/www.tmforum.org\/resources\/standard\/ig1143-license-management-r16-5-1\/. Tm forum exploratory report: Nfv license management, 2017. https:\/\/www.tmforum.org\/resources\/standard\/ig1143-license-management-r16-5-1\/."},{"unstructured":"Trusted boot project 2017. https:\/\/sourceforge.net\/projects\/tboot\/.  Trusted boot project 2017. https:\/\/sourceforge.net\/projects\/tboot\/.","key":"e_1_3_2_1_22_1"},{"unstructured":"Kubernetes apps in gcp marketplace 2018. https:\/\/goo.gl\/dbHWix.  Kubernetes apps in gcp marketplace 2018. https:\/\/goo.gl\/dbHWix.","key":"e_1_3_2_1_23_1"},{"unstructured":"Trusting the cloud with intel txt 2018. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/trusting-the-cloud-with-trusted-execution\\discretionary{-}{}{}technology-video.html.  Trusting the cloud with intel txt 2018. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/trusting-the-cloud-with-trusted-execution\\discretionary{-}{}{}technology-video.html.","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/978-1-4302-6584-9_3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/ISCAS.2012.6271612"},{"key":"e_1_3_2_1_27_1","first-page":"86","volume":"2016","author":"Costan V.","year":"2016","unstructured":"Costan , V. , and Devadas , S. Intel sgx explained. IACR Cryptology e Print Archive 2016 ( 2016 ), 86 . Costan, V., and Devadas, S. Intel sgx explained. IACR Cryptology ePrint Archive 2016 (2016), 86.","journal-title":"Print Archive"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1133058.1133063"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1007\/978-1-4419-5906-5_796","volume-title":"Encyclopedia of Cryptography and Security","author":"Morris T.","year":"2011","unstructured":"Morris , T. Trusted platform module . In Encyclopedia of Cryptography and Security . Springer , 2011 , pp. 1332 -- 1335 . Morris, T. Trusted platform module. In Encyclopedia of Cryptography and Security. Springer, 2011, pp. 1332--1335."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/TC.2011.60"},{"key":"e_1_3_2_1_32_1","first-page":"223","volume-title":"USENIX Security Symposium","volume":"13","author":"Sailer R.","year":"2004","unstructured":"Sailer , R. , Zhang , X. , Jaeger , T. , and Van Doorn , L. Design and implementation of a tcg-based integrity measurement architecture . In USENIX Security Symposium ( 2004 ), vol. 13 , pp. 223 -- 238 . Sailer, R., Zhang, X., Jaeger, T., and Van Doorn, L. Design and implementation of a tcg-based integrity measurement architecture. In USENIX Security Symposium (2004), vol. 13, pp. 223--238."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/MDT.2007.179"},{"key":"e_1_3_2_1_34_1","first-page":"194","volume":"2002","author":"Sundaram B.","year":"2002","unstructured":"Sundaram , B. , and Chapman , B. Xml -based policy engine framework for usage policy management in grids. Grid Computing---GRID 2002 ( 2002 ), 194 -- 198 . Sundaram, B., and Chapman, B. Xml-based policy engine framework for usage policy management in grids. Grid Computing---GRID 2002 (2002), 194--198.","journal-title":"Grid Computing---GRID"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"acronym":"HotNets '18","name":"HotNets '18: The 17th ACM workshop on Hot Topics in Networks","location":"Redmond WA USA"},"container-title":["Proceedings of the 17th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286062.3286086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:15Z","timestamp":1750207455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,15]]},"references-count":34,"alternative-id":["10.1145\/3286062.3286086","10.1145\/3286062"],"URL":"https:\/\/doi.org\/10.1145\/3286062.3286086","relation":{},"subject":[],"published":{"date-parts":[[2018,11,15]]},"assertion":[{"value":"2018-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}