{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:30:00Z","timestamp":1743107400510,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030496685"},{"type":"electronic","value":"9783030496692"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49669-2_2","type":"book-chapter","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T23:09:17Z","timestamp":1592435357000},"page":"24-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Managing Secure Inter-slice Communication in 5G Network Slice Chains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7831-9252","authenticated-orcid":false,"given":"Luis","family":"Su\u00e1rez","sequence":"first","affiliation":[]},{"given":"David","family":"Espes","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Cao-Thanh","family":"Phan","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Bertin","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Le Parc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,18]]},"reference":[{"key":"2_CR1","unstructured":"3GPP: Specification # 23.501 (2018)"},{"key":"2_CR2","unstructured":"3GPP: Specification # 28.531 (2018)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"3GPP: Specification # 28.801 (2018)","DOI":"10.1007\/s40274-018-4883-5"},{"key":"2_CR4","unstructured":"5G-ENSURE: Deliverable D2.7 - Security Architecture (2016)"},{"key":"2_CR5","unstructured":"5G-PPP: View on 5G Architecture (Version 2.0) (2017)"},{"key":"2_CR6","unstructured":"5G-PPP: D2.3, 5G Mobile Network Architecture, Final overall architecture (2019)"},{"key":"2_CR7","unstructured":"Americas, G.: The Evolution of Security in 5G (2019)"},{"key":"2_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/978-3-030-15032-7_89","volume-title":"Advanced Information Networking and Applications","author":"B Bordel","year":"2020","unstructured":"Bordel, B., Alcarria, R., S\u00e1nchez-de-Rivera, D., S\u00e1nchez, \u00c1.: An inter-slice management solution for future virtualization-based 5G systems. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) AINA 2019. AISC, vol. 926, pp. 1059\u20131070. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-15032-7_89"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-662-44879-3_13","volume-title":"Advanced Information Systems Engineering","author":"Antonio Brogi","year":"2014","unstructured":"Brogi, A.: TOSCA in a nutshell: promises and perspectives (2014)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Clayman, S., Tusa, F., Galis, A.: Extending slices into data centers: the VIM on-demand model. In: 2018 9th International Conference on the Network of the Future (NOF), pp. 31\u201338 (2018)","DOI":"10.1109\/NOF.2018.8597850"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Compasti\u00e9, M., Badonnel, R., Festor, O., He, R.: A TOSCA-oriented software-defined security approach for unikernel-based protected clouds. In: 2019 IEEE Conference on Network Softwarization (NetSoft) (2019)","DOI":"10.1109\/NETSOFT.2019.8806623"},{"key":"2_CR12","unstructured":"ETSI: ETSI GR NFV-EVE 012 V3.1.1 (2017\u201312) (2017)"},{"key":"2_CR13","unstructured":"ETSI: ETSI GS NFV-IFA 014 V2.3.1 (2017\u201308) (2017)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Guija, D., Siddiqui, M.S.: Identity and access control for micro-services based 5G NFV platforms. In: Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM (2018)","DOI":"10.1145\/3230833.3233255"},{"key":"2_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9781420013283","volume-title":"Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI","author":"D Herrmann","year":"2007","unstructured":"Herrmann, D.: Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI. CRC Press, Boca Raton (2007)"},{"key":"2_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/9781119425144","volume-title":"5G System Design: Architectural and Functional Considerations and Long Term Research","author":"P Marsch","year":"2018","unstructured":"Marsch, P., Bulakci, O., Queseth, O., Boldi, M.: 5G System Design: Architectural and Functional Considerations and Long Term Research, 1st edn. Wiley, Hoboken (2018)","edition":"1"},{"key":"2_CR17","unstructured":"Nowak, T.: Matematyczny model izolacji us\u0142ug w sieciach plastrowych. Przeglkad Telekomunikacyjny + Wiadomo\u015bci Telekomunikacyjne (2017)"},{"key":"2_CR18","unstructured":"Pattaranantakul, M., He, R., Zhang, Z., Meddahi, A., Wang, P.: Leveraging network functions virtualization orchestrators to achieve software-defined access control in the clouds. IEEE Trans. Dependable Secure Comput., 1 (2018)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Ross, R., McEvilley, M., Oren, J.: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. Technical report, NIST Special Publication (SP) 800\u2013160, vol. 1, National Institute of Standards and Technology (2018)","DOI":"10.6028\/NIST.SP.800-160v1"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.csi.2017.01.002","volume":"54","author":"I Trajkovska","year":"2017","unstructured":"Trajkovska, I., et al.: SDN-based service function chaining mechanism and service prototype implementation in NFV scenario. Comput. Stand. Interfaces 54, 247\u2013265 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"de Vaulx, F.J., Simmon, E.D., Bohn, R.B.: Cloud Computing Service Metrics Description. Special Publication (NIST SP) - 500\u2013307 (2018)","DOI":"10.6028\/NIST.SP.500-307"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49669-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T23:02:40Z","timestamp":1718665360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49669-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030496685","9783030496692"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49669-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Regensburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2020.ur.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virutally due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}