{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:49:43Z","timestamp":1730285383805,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/netsys.2019.8854524","type":"proceedings-article","created":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T00:26:41Z","timestamp":1570148801000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Application Threat Modeling and Automated VNF Selection for Mitigation using TOSCA"],"prefix":"10.1109","author":[{"given":"Karoline","family":"Saatkamp","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Krieger","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Sudendorf","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Wurster","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"ref32","article-title":"Policy-Aware Provisioning and Management of Cloud Applications","volume":"7","author":"breitenb\u00fccher","year":"2014","journal-title":"International Journal on Advances in Security"},{"key":"ref31","first-page":"56","article-title":"UML-based Cloud Application Modeling with Libraries, Profiles, and Templates","author":"bergmayr","year":"0","journal-title":"Proceedings of the 2nd International Workshop on Model-Driven Engineering on and for the Cloud (CloudMDE 2014) CEUR-WS org"},{"key":"ref30","first-page":"399","article-title":"CloudML: An Integrated Language for Resource, Service and Request Description for D-Clouds","author":"gon\u00e7alves","year":"0","journal-title":"Proceedings of the Third International Conference on Cloud Computing Technology and Science (CloudCom 2011)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116152"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0115"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006371002750286"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3151759.3151789"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2018.00013"},{"journal-title":"Topology and Orchestration Specification for Cloud Applications (TOSCA) Version 1 0","year":"2013","key":"ref13"},{"journal-title":"TOSCA Simple Profile in YAML Version 1 2","year":"2018","key":"ref14"},{"journal-title":"TOSCA Simple Profile for Network Functions Vinualizasion (NFV) Version 1 0","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45005-1_64"},{"key":"ref17","first-page":"142","article-title":"Policy-Aware Provisioning Plan Generation for TOSCA-based Applications","author":"k\u00e9pes","year":"0","journal-title":"Proceedings of The Eleventh International Conference on Emerging Security Information Systems and Technologies (SECUR-WARE 2017)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41030-7_26"},{"key":"ref19","first-page":"86","article-title":"Policy-Aware Provisioning of Cloud Applications","author":"breitenb\u00fccher","year":"0","journal-title":"SECURWARE 2013 The Seventh International Conference on Emerging Security Information Systems and Technologies"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3150227"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0622"},{"key":"ref27","first-page":"22","article-title":"Declarative vs. Imperative: Two Modeling Patterns for the Automated Deployment of Applications","author":"endres","year":"0","journal-title":"Proceedings of the 9th International Conference on Pervasive Patterns and Applications (PATTERNS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604049"},{"journal-title":"Network Functions Virtualisation An Introduction Benefits Enablers Challenges and Call for Action","year":"2012","author":"chiosi","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.133"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"journal-title":"IEEE Communications Surveys Tutorials","article-title":"A survey on emerging SDN and NFV security mechanisms for IoT systems","year":"2018","author":"farris","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2017.8088617"},{"journal-title":"The Security Development Lifecycle","year":"2006","author":"howard","key":"ref2"},{"key":"ref9","first-page":"247","article-title":"Automatic Topology Completion of TOSCA-based Cloud Applications","volume":"p 251","author":"hirmer","year":"2014","journal-title":"GI-Jahrestagung"},{"journal-title":"Cybersecurity for Industry 4 0","year":"2018","key":"ref1"},{"journal-title":"Network Functions Virtualisation (NFV) Architectural Framework","year":"2013","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3151759.3151830"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45005-1_62"},{"journal-title":"TOSCA Portable Automated Deployment and Management of Cloud Applications","first-page":"527","year":"2014","author":"binz","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.43"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.56"},{"journal-title":"Production Workflow Concepts and Techniques","year":"2000","author":"leymann","key":"ref25"}],"event":{"name":"2019 International Conference on Networked Systems (NetSys)","start":{"date-parts":[[2019,3,18]]},"location":"Munich, Germany","end":{"date-parts":[[2019,3,21]]}},"container-title":["2019 International Conference on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8847242\/8854488\/08854524.pdf?arnumber=8854524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:19:59Z","timestamp":1658261999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8854524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/netsys.2019.8854524","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}