{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:19:33Z","timestamp":1730222373510,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/fmec49853.2020.9144764","type":"proceedings-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T21:29:00Z","timestamp":1595366940000},"page":"38-45","source":"Crossref","is-referenced-by-count":1,"title":["Third Party Session Control at the Network Edge"],"prefix":"10.1109","author":[{"given":"Ivaylo","family":"Atanasov","sequence":"first","affiliation":[]},{"given":"Evelina","family":"Pencheva","sequence":"additional","affiliation":[]},{"given":"Denitsa","family":"Velkova","sequence":"additional","affiliation":[]},{"given":"Ventsislav","family":"Trifonov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00109"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898316"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2019.8711901"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2019-0037"},{"key":"ref14","first-page":"105","article-title":"Access and mobility policy control at the network edge","volume":"11","author":"pencheva","year":"2019","journal-title":"ISC International Journal of Information Security"},{"key":"ref15","article-title":"MEC in 5G Networks","author":"kekki","year":"2018","journal-title":"ETSI White Paper No 28"},{"key":"ref16","article-title":"MEC Deployments in 4G and Evolution Towards 5G","author":"giust","year":"2018","journal-title":"ETSI White Paper No 24"},{"journal-title":"T8 reference point for Northbound APIs","article-title":"3GPP TS 29.122 Technical Specification Group Core Network and Terminals","year":"2019","key":"ref17"},{"journal-title":"Network Exposure Function Northbound APIs Stage 3","article-title":"3GPP TS 29.522 Technical Specification Group Core Network and Terminals;5G System","year":"2018","key":"ref18"},{"journal-title":"Policy and Charging Control Signalling Flows and QoS Parameter Mapping","article-title":"3GPP TS 29.513 Technical Specification Group Core Network and Terminals;5G System","year":"2019","key":"ref19"},{"key":"ref4","article-title":"A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art","author":"pham","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2019.1800009"},{"journal-title":"Recent advances in mobile edge computing and content caching Digital Communications and Networks Digital Communications and Networks","year":"2019","author":"safavat","key":"ref6"},{"key":"ref5","first-page":"8","volume":"7","author":"wang","year":"2019","journal-title":"Edge Computing Applications State-of-the-Art and Challenges Advances in Networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800971"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2889196"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849509"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800608"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701310"},{"journal-title":"Procedures for the 5G System","article-title":"3GPP TS 23.502 Technical Specification Group Services and System Aspects","year":"2019","key":"ref20"},{"journal-title":"Eclipse Vert x","year":"0","key":"ref22"},{"journal-title":"Market Acceleration MEC Metrics Best Practice and Guidelines","article-title":"ETSI GS MEC-IEG 006 Mobile Edge Computing","year":"2017","key":"ref21"},{"journal-title":"Requirements for IMT-2020 network","article-title":"ITU-T, Y.3101","year":"2018","key":"ref24"},{"journal-title":"Redislab 5 0 7","year":"0","key":"ref23"},{"key":"ref26","first-page":"1","author":"parvez","year":"2018","journal-title":"A Survey on Low Latency Towards 5G RAN Core Network and Chaching Solutions"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685687"}],"event":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2020,4,20]]},"location":"Paris, France","end":{"date-parts":[[2020,4,23]]}},"container-title":["2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9141176\/9144692\/09144764.pdf?arnumber=9144764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:47:13Z","timestamp":1656344833000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9144764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/fmec49853.2020.9144764","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}