{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:45:10Z","timestamp":1725785110312},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cybersecurity49315.2020.9138883","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:45:17Z","timestamp":1594680317000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["A Security Perspective on Unikernels"],"prefix":"10.1109","author":[{"given":"Joshua","family":"Talbot","sequence":"first","affiliation":[]},{"given":"Przemek","family":"Pikula","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Sweetmore","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Rowe","sequence":"additional","affiliation":[]},{"given":"Hanan","family":"Hindy","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Bellekens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Unikernels in action","author":"bright","year":"2018","journal-title":"presented at the DevConf cz Brno"},{"journal-title":"J O system written in JavaScript “Jsos ”","year":"0","key":"ref11"},{"journal-title":"Graphene library OS","year":"0","author":"lab","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592812"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3381052.3381326"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387526"},{"article-title":"Assessing unikernel security","year":"2019","author":"eyberg","key":"ref16"},{"year":"2017","author":"buer","key":"ref17"},{"journal-title":"MMC Corporation","year":"2015","key":"ref18"},{"article-title":"Assessing unikernel security","year":"2019","author":"michaels","key":"ref19"},{"year":"0","key":"ref28","article-title":"49.2 introduction to selinux"},{"article-title":"Attacks on virtual machine emulators","year":"0","author":"ferrie","key":"ref4"},{"article-title":"mandatory access control (mac)","year":"2013","author":"rouse","key":"ref27"},{"year":"2010","key":"ref3","article-title":"What is the difference between hardware and software virtualization?"},{"article-title":"Vmware paravirtualization","year":"2007","author":"horne","key":"ref6"},{"year":"2019","key":"ref29","article-title":"sbeattie"},{"article-title":"commit d0153ca35d344d9b640dc305031b0703ba3f30f0","year":"2009","author":"katria","key":"ref5"},{"article-title":"Containerization vs virtualization an introduction to docker","year":"2015","author":"pethuru raj","key":"ref8"},{"article-title":"Para virtualization vs full virtualization vs hardware assisted virtualization","year":"2017","author":"lingeswaran","key":"ref7"},{"article-title":"Vmware vcloud suite 6.0 documentation","year":"2015","author":"mware","key":"ref2"},{"article-title":"Docker containers are filled with vulnerabilities: Here’s how the top 1,000 fared","year":"0","author":"sanders","key":"ref9"},{"year":"2019","key":"ref1","article-title":"What is a virtual machine?"},{"article-title":"Mirageos security advisory 02","year":"2019","author":"leonard","key":"ref20"},{"article-title":"Unikernels are unfit for production","year":"2016","author":"cantrill","key":"ref22"},{"article-title":"Unikernels will create more security problems than they solve","year":"2016","author":"bias","key":"ref21"},{"article-title":"Host hardening - achieve or avoid","year":"2016","author":"kapoor","key":"ref24"},{"article-title":"A discussion of the operational challenges with unikernels","year":"2015","author":"rushmore","key":"ref23"},{"year":"2018","author":"ali","key":"ref26"},{"year":"2015","author":"dimitri","key":"ref25"}],"event":{"name":"2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2020,6,15]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9136807\/9138848\/09138883.pdf?arnumber=9138883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:33:40Z","timestamp":1656344020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9138883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cybersecurity49315.2020.9138883","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}