{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:48:08Z","timestamp":1770223688891,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"Horizon 2020 Framework Programme","award":["871808"],"award-info":[{"award-number":["871808"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3409219","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T10:24:32Z","timestamp":1598351072000},"page":"1-10","source":"Crossref","is-referenced-by-count":37,"title":["INSPIRE-5Gplus"],"prefix":"10.1145","author":[{"given":"Jordi","family":"Ortiz","sequence":"first","affiliation":[{"name":"University of Murcia"}]},{"given":"Ramon","family":"Sanchez-Iborra","sequence":"additional","affiliation":[{"name":"University of Murcia"}]},{"given":"Jorge Bernal","family":"Bernabe","sequence":"additional","affiliation":[{"name":"University of Murcia"}]},{"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[{"name":"University of Murcia"}]},{"given":"Chafika","family":"Benzaid","sequence":"additional","affiliation":[{"name":"Aalto University"}]},{"given":"Tarik","family":"Taleb","sequence":"additional","affiliation":[{"name":"Aalto University"}]},{"given":"Pol","family":"Alemany","sequence":"additional","affiliation":[{"name":"Centre Tecnol\u00f2gic de Telecomunicacions de Catalunya (CTTC\/CERCA)"}]},{"given":"Raul","family":"Mu\u00f1oz","sequence":"additional","affiliation":[{"name":"Centre Tecnol\u00f2gic de Telecomunicacions de Catalunya (CTTC\/CERCA)"}]},{"given":"Ricard","family":"Vilalta","sequence":"additional","affiliation":[{"name":"Centre Tecnol\u00f2gic de Telecomunicacions de Catalunya (CTTC\/CERCA)"}]},{"given":"Chrystel","family":"Gaber","sequence":"additional","affiliation":[{"name":"Orange"}]},{"given":"Jean-Philippe","family":"Wary","sequence":"additional","affiliation":[{"name":"Orange"}]},{"given":"Dhouha","family":"Ayed","sequence":"additional","affiliation":[{"name":"Thales"}]},{"given":"Pascal","family":"Bisson","sequence":"additional","affiliation":[{"name":"Thales"}]},{"given":"Maria","family":"Christopoulou","sequence":"additional","affiliation":[{"name":"NCSR Demokritos"}]},{"given":"George","family":"Xilouris","sequence":"additional","affiliation":[{"name":"NCSR Demokritos"}]},{"given":"Edgardo Montes","family":"de Oca","sequence":"additional","affiliation":[{"name":"Montimage"}]},{"given":"G\u00fcrkan","family":"G\u00fcr","sequence":"additional","affiliation":[{"name":"Zurich University of Applied Sciences"}]},{"given":"Gianni","family":"Santinelli","sequence":"additional","affiliation":[{"name":"Solidshield"}]},{"given":"Vincent","family":"Lefebvre","sequence":"additional","affiliation":[{"name":"Solidshield"}]},{"given":"Antonio","family":"Pastor","sequence":"additional","affiliation":[{"name":"Telefonica R&amp;D"}]},{"given":"Diego","family":"Lopez","sequence":"additional","affiliation":[{"name":"Telefonica R&amp;D"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. ETSI GS NFV-SOL007 Network Service Descriptor File Structure Specification. ([n. d.]). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SOL\/001_099\/007\/02.06.01_60\/gs_NFV-SOL007v020601p.pdf  [n. d.]. ETSI GS NFV-SOL007 Network Service Descriptor File Structure Specification. ([n. d.]). https:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SOL\/001_099\/007\/02.06.01_60\/gs_NFV-SOL007v020601p.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"5G PPP Security Work Group. 2017. 5G PPP Phase 1 Security Landscape. Technical Report. 5G PPP Security WG. 1--68 pages. https:\/\/5g-ppp.eu\/wp-content\/uploads\/2014\/02\/5G-PPP_White-Paper_Phase-1-Security-Landscape_June-2017.pdfhttps:\/\/5g-ppp.eu\/new-security-group-5g-ppp-white-paper-phase-1-security-landscape\/  5G PPP Security Work Group. 2017. 5G PPP Phase 1 Security Landscape. Technical Report. 5G PPP Security WG. 1--68 pages. https:\/\/5g-ppp.eu\/wp-content\/uploads\/2014\/02\/5G-PPP_White-Paper_Phase-1-Security-Landscape_June-2017.pdfhttps:\/\/5g-ppp.eu\/new-security-group-5g-ppp-white-paper-phase-1-security-landscape\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.379799"},{"key":"e_1_3_2_1_4_1","volume-title":"Pedro Henrique Gomes","author":"Allan Vidal Silvia Lins","year":"2018"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900252"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900273"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233251"},{"key":"e_1_3_2_1_8_1","unstructured":"Frank Brockners Shwetha Bhandari Tal Mizrahi Sashank Dara and Stephen Youell. 2020. Proof of Transit. Internet-Draft draft-ietf-sfc-proof-of-transit-05. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sfc-proof-of-transit-05 Work in Progress.  Frank Brockners Shwetha Bhandari Tal Mizrahi Sashank Dara and Stephen Youell. 2020. Proof of Transit. Internet-Draft draft-ietf-sfc-proof-of-transit-05. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sfc-proof-of-transit-05 Work in Progress."},{"key":"e_1_3_2_1_9_1","unstructured":"China Unicom Deutsche Telekom DOCOMO NTT Sprint Telefonica). 2017. Zero-touch Network and Service Management - Introductory White Paper . ZSM Operator white paper. (2017). https:\/\/portal.etsi.org\/Portals\/0\/TBpages\/ZSM\/Docs\/ZSM%20Operator%20white%20paper.pdf?ver=2017-12-07-142037-453 Accessed on 25.05.2020.  China Unicom Deutsche Telekom DOCOMO NTT Sprint Telefonica). 2017. Zero-touch Network and Service Management - Introductory White Paper . ZSM Operator white paper. (2017). https:\/\/portal.etsi.org\/Portals\/0\/TBpages\/ZSM\/Docs\/ZSM%20Operator%20white%20paper.pdf?ver=2017-12-07-142037-453 Accessed on 25.05.2020."},{"key":"e_1_3_2_1_10_1","volume-title":"Extending Security-by-Contract with Quantitative Trust on Mobile Devices. In 2010 International Conference on Complex, Intelligent and Software Intensive Systems. 872--877","author":"Costa G."},{"key":"e_1_3_2_1_11_1","volume-title":"Security-by-contract for web services. SWS","author":"Dragoni Nicola","year":"2007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2007.2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"e_1_3_2_1_14_1","volume-title":"Zero-touch network and Service Management (ZSM)","author":"ETSI INDUSTRY SPECIFICATION GROUP","year":"2019"},{"key":"e_1_3_2_1_15_1","volume-title":"Network Functions Virtualisation (NFV)","author":"European Telecommunications Standards Institute","year":"2013"},{"key":"e_1_3_2_1_16_1","first-page":"5","volume-title":"RFC 8520 - Manufacturer Usage Description Specification. https:\/\/tools.ietf.org\/html\/rfc8520, last visited on 31 07","author":"Lear Eliot","year":"2019"},{"key":"e_1_3_2_1_17_1","unstructured":"Rafael Lopez Gabriel Lopez-Millan and Fernando Pereniguez-Garcia. 2020. Software-Defined Networking (SDN)-based IPsec Flow Protection. Internet-Draft draft-ietf-i2nsf-sdn-ipsec-flow-protection-08. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-i2nsf-sdn-ipsec-flow-protection-08.txt http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-i2nsf-sdn-ipsec-flow-protection-08.txt.  Rafael Lopez Gabriel Lopez-Millan and Fernando Pereniguez-Garcia. 2020. Software-Defined Networking (SDN)-based IPsec Flow Protection. Internet-Draft draft-ietf-i2nsf-sdn-ipsec-flow-protection-08. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-i2nsf-sdn-ipsec-flow-protection-08.txt http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-i2nsf-sdn-ipsec-flow-protection-08.txt."},{"key":"e_1_3_2_1_18_1","unstructured":"B. Moran H. Tschofenig and H. Birkholz. 2019. SUIT CBOR manifest serialisation format (draft). (July 2019). https:\/\/www.ietf.org\/archive\/id\/draft-moran-suit-manifest-05.txt  B. Moran H. Tschofenig and H. Birkholz. 2019. SUIT CBOR manifest serialisation format (draft). (July 2019). https:\/\/www.ietf.org\/archive\/id\/draft-moran-suit-manifest-05.txt"},{"key":"e_1_3_2_1_19_1","volume-title":"Scanclave: Verifying Application Runtime Integrity in Un-trusted Environments. 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","author":"Morbitzer M.","year":"2019"},{"key":"e_1_3_2_1_20_1","volume-title":"The legal and political battles of Y2K","author":"Mulvin Dylan","year":"2020"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","location":"Virtual Event Ireland","acronym":"ARES 2020"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409219","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3409219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:23Z","timestamp":1750200083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409219"}},"subtitle":["intelligent security and pervasive trust for 5G and beyond networks"],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":20,"alternative-id":["10.1145\/3407023.3409219","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3409219","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]}}}