{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:10:23Z","timestamp":1725603023639},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000774","name":"DTRA","doi-asserted-by":"publisher","award":["HDTRA1-09-1-0050"],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1411636,CNS-1618339,CNS-1617729,CNS 1814322,CNS183677"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,10]]},"DOI":"10.1109\/nfv-sdn50289.2020.9289888","type":"proceedings-article","created":{"date-parts":[[2020,12,24]],"date-time":"2020-12-24T18:38:38Z","timestamp":1608835118000},"page":"126-131","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Performance, Security, and Management in Network Function Virtualization"],"prefix":"10.1109","author":[{"given":"Yang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhi-Li","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ETSI NFV Standard","year":"2017","key":"ref39"},{"journal-title":"Logcabin A distributed storage using raft","year":"2016","author":"ongaro","key":"ref38"},{"journal-title":"Towards Robust Distributed Systems","year":"2000","author":"brewer","key":"ref33"},{"journal-title":"Comparison of the SD-WAN vendor solutions","year":"2017","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851220"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2955193.2955204"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491186"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775010"},{"journal-title":"Qualcomm-5G-NR","year":"2018","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"journal-title":"Proc OSDI","article-title":"The Chubby Lock Service for Loosely-coupled Distributed Systems","year":"0","author":"burrows","key":"ref28"},{"journal-title":"Decoding 5G New Radio The Latest on 3GPP and ITU Standards","year":"2018","author":"yost","key":"ref63"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845049"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145716"},{"journal-title":"Proc USENIX ATC","article-title":"In Search of an Understandable Consensus Algorithm","year":"0","author":"ongaro","key":"ref29"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470940"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815429"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890961"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.12.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7665"},{"journal-title":"Realizing the Information Future The Internet and Beyond","year":"1994","author":"council","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.159"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631453"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"journal-title":"OpenDaylight Open Source SDN Platform","year":"2017","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.98"},{"journal-title":"Proc ATC","article-title":"Zookeeper: Wait-free coordination for internet-scale systems","year":"0","author":"hunt","key":"ref59"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"journal-title":"Proc NSDI","article-title":"Consensus in a box: Inexpensive coordination in hardware","year":"0","author":"istv\u00e1n","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774999"},{"journal-title":"Proc of CCNC","article-title":"A survey of network function placement","year":"0","author":"li","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774998"},{"journal-title":"Proc SIGCOMM","article-title":"PGA: Using Graphs to Express and Automatically Reconcile Network Policies","year":"0","author":"hartert","key":"ref53"},{"journal-title":"Proc NSDI","article-title":"Buzz: Testing context-dependent policies in stateful networks","year":"0","author":"fayaz","key":"ref52"},{"journal-title":"RFC 7498","article-title":"Problem Statement for Service Function Chaining","year":"2015","author":"nadeau","key":"ref10"},{"year":"2018","key":"ref40","article-title":"OPNFV: Open Platform for NFV"},{"journal-title":"IETF Tech Rep","article-title":"Service Function Chaining Use Cases in Mobile Networks","year":"2016","author":"napper","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2401568"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050236"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098826"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6824"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2342468.2342476"},{"journal-title":"Proc NSDI","article-title":"How hard can it be? designing and implementing a deployable multipath tcp","year":"0","author":"raiciu","key":"ref18"},{"journal-title":"Proc NSDI","article-title":"Design, implementation and evaluation of congestion control for multipath tcp","year":"0","author":"wischik","key":"ref19"},{"journal-title":"Proc NSDI","article-title":"Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags","year":"0","author":"fayazbakhsh","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098828"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733615"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098827"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4626228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999602"},{"journal-title":"IETF Internet-Draft draft-ietf-sfc-dc-use-cases-06","article-title":"Service Function Chaining Use Cases In Data Centers","year":"2017","author":"kumar","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787501"},{"journal-title":"Proc NSDI","article-title":"Stateless network functions: Breaking the tight coupling of state and processing","year":"0","author":"kablan","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005754"},{"journal-title":"Proc NSDI","article-title":"Elastic scaling of stateful network functions","year":"0","author":"woo","key":"ref47"},{"journal-title":"Proc NSDI","article-title":"Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes","year":"0","author":"rajagopalan","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"journal-title":"Proc NSDI","article-title":"Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr This paper is included in the Proceedings of the","year":"0","author":"khalid","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"}],"event":{"name":"2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","start":{"date-parts":[[2020,11,10]]},"location":"Leganes, Spain","end":{"date-parts":[[2020,11,12]]}},"container-title":["2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9289697\/9289848\/09289888.pdf?arnumber=9289888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:53:33Z","timestamp":1656438813000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9289888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,10]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn50289.2020.9289888","relation":{},"subject":[],"published":{"date-parts":[[2020,11,10]]}}}