{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:50:35Z","timestamp":1725810635561},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/cscn.2017.8088620","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T14:36:56Z","timestamp":1509460616000},"page":"187-192","source":"Crossref","is-referenced-by-count":10,"title":["Securing VNF communication in NFVI"],"prefix":"10.1109","author":[{"given":"Shankar","family":"Lal","sequence":"first","affiliation":[]},{"given":"Aapo","family":"Kalliola","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Oliver","sequence":"additional","affiliation":[]},{"given":"Kimmo","family":"Ahola","sequence":"additional","affiliation":[]},{"given":"Tarik","family":"Taleb","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"298","article-title":"Challenges for Cloud Networking Security","author":"peter","year":"2010","journal-title":"MONAMI"},{"journal-title":"OpenStack Docs Scenario Classic with Open vSwitch","year":"0","key":"ref11"},{"journal-title":"OpenS tack Neutron","year":"0","key":"ref12"},{"journal-title":"Linux Foundation Open vSwitch","year":"0","key":"ref13"},{"journal-title":"The Open Source Vpn Openvpn","year":"0","key":"ref14"},{"journal-title":"Libguestfs tools for accessing and modifying virtual machine disk images","year":"0","key":"ref15"},{"journal-title":"Open source Python implementation of the KMIP Specification","year":"0","key":"ref16"},{"journal-title":"Proc IEEE GLOBECOM 2016","article-title":"Dynamic Cloud Resource Scheduling in Virtualized 5G Mobile Systems","year":"2016","author":"ahmad","key":"ref17"},{"journal-title":"Proc IEEE IWCMC 2016","article-title":"Impact of Network Function Virtualization: A Study based on Real-Life Mobile Network Data","year":"2016","author":"ahmad","key":"ref18"},{"journal-title":"OpenVPN Performance Benchmarking","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2017.7899394"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845052"},{"journal-title":"CSA Security Guidance Version 3 Virtualization","year":"0","key":"ref6"},{"journal-title":"Proc IEEE ICC 2017","article-title":"Assuring Virtual Network Function Image Integrity and Host Sealing in Telco Cloud","year":"2017","author":"lal","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355586"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437032"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064907"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1500244RP"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600899"},{"journal-title":"Iperf","year":"0","key":"ref20"}],"event":{"name":"2017 IEEE Conference on Standards for Communications and Networking (CSCN)","start":{"date-parts":[[2017,9,18]]},"location":"Helsinki, Finland","end":{"date-parts":[[2017,9,20]]}},"container-title":["2017 IEEE Conference on Standards for Communications and Networking (CSCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8074544\/8088583\/08088620.pdf?arnumber=8088620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T15:41:48Z","timestamp":1512056508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8088620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cscn.2017.8088620","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}