{"id":"https://openalex.org/W3049518473","doi":"https://doi.org/10.1109/netsoft48620.2020.9165316","title":"Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework","display_name":"Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3049518473","doi":"https://doi.org/10.1109/netsoft48620.2020.9165316","mag":"3049518473"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft48620.2020.9165316","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002135714","display_name":"Antonio Suriano","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Antonio Suriano","raw_affiliation_strings":["Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046862120","display_name":"Domenico Striccoli","orcid":"https://orcid.org/0000-0003-2904-6961"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Domenico Striccoli","raw_affiliation_strings":["Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058937816","display_name":"Giuseppe Piro","orcid":"https://orcid.org/0000-0003-3783-5565"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Piro","raw_affiliation_strings":["Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041551145","display_name":"Raffele Bolla","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Raffele Bolla","raw_affiliation_strings":["Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026099433","display_name":"Gennaro Boggia","orcid":"https://orcid.org/0000-0002-0883-3045"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gennaro Boggia","raw_affiliation_strings":["Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT)","institution_ids":["https://openalex.org/I4210099310"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5002135714"],"corresponding_institution_ids":["https://openalex.org/I4210099310"],"apc_list":null,"apc_paid":null,"fwci":0.5302,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72720047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"479","last_page":"486"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.7177774906158447},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6683651208877563},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5338953733444214},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5118967294692993},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4475223124027252},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.41960105299949646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.402382493019104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38337817788124084},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2778193950653076},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17710649967193604},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0984356701374054}],"concepts":[{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.7177774906158447},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6683651208877563},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5338953733444214},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5118967294692993},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4475223124027252},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.41960105299949646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.402382493019104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38337817788124084},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2778193950653076},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17710649967193604},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0984356701374054},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/netsoft48620.2020.9165316","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.unige.it:11567/1035722","is_oa":false,"landing_page_url":"http://hdl.handle.net/11567/1035722","pdf_url":null,"source":{"id":"https://openalex.org/S4377196291","display_name":"CINECA IRIS Institutial Research Information System (University of Genoa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83816512","host_organization_name":"University of Genoa","host_organization_lineage":["https://openalex.org/I83816512"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1976113535","https://openalex.org/W2081336406","https://openalex.org/W2115175416","https://openalex.org/W2154182965","https://openalex.org/W2289096564","https://openalex.org/W2569368899","https://openalex.org/W2570150511","https://openalex.org/W2586976974","https://openalex.org/W2602033679","https://openalex.org/W2606106394","https://openalex.org/W2613691543","https://openalex.org/W2740615677","https://openalex.org/W2756125411","https://openalex.org/W2803372200","https://openalex.org/W2805058107","https://openalex.org/W2883053505","https://openalex.org/W2886746860","https://openalex.org/W2889650910","https://openalex.org/W2891808071","https://openalex.org/W2899902826","https://openalex.org/W2903982230","https://openalex.org/W2909176926","https://openalex.org/W2944198321","https://openalex.org/W2946156608","https://openalex.org/W2955653233","https://openalex.org/W2964768188","https://openalex.org/W2964796648","https://openalex.org/W2969442765","https://openalex.org/W2970076435","https://openalex.org/W2970873581","https://openalex.org/W2973916085","https://openalex.org/W2979651171","https://openalex.org/W2982421118","https://openalex.org/W2985892575","https://openalex.org/W3104427069"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W1497930374","https://openalex.org/W2168345601","https://openalex.org/W2028268185","https://openalex.org/W2377235694"],"abstract_inverted_index":{"The":[0,181],"new":[1],"generation":[2],"of":[3,13,53,75,79,87,94,102,140,189],"digital":[4],"services":[5],"are":[6],"natively":[7],"conceived":[8],"as":[9],"an":[10],"ordered":[11],"set":[12],"Virtual":[14,143,161],"Network":[15,144,162],"Functions,":[16],"deployed":[17],"across":[18],"boundaries":[19],"and":[20,31,34,72,90,132,177],"organizations.":[21],"In":[22],"this":[23,88,109,111],"context,":[24],"security":[25,175],"threats,":[26],"variable":[27],"network":[28],"conditions,":[29],"computational":[30],"memory":[32],"capabilities":[33],"software":[35],"vulnerabilities":[36],"may":[37],"significantly":[38],"weaken":[39],"the":[40,50,70,73,85,92,97,120,130,133,148,159,171,187,190],"whole":[41],"service":[42],"chain,":[43],"thus":[44,57],"making":[45],"very":[46],"difficult":[47],"to":[48,60,68,91],"combat":[49],"newest":[51],"kinds":[52],"attacks.":[54],"It":[55],"is":[56],"extremely":[58],"important":[59],"conceive":[61],"a":[62,80,114,153,165,194],"flexible":[63],"(and":[64],"standard-compliant)":[65],"framework":[66],"able":[67],"attest":[69],"trustworthiness":[71],"reliability":[74,179],"each":[76,141],"single":[77,142],"function":[78],"Service":[81,166],"Function":[82,145,167],"Chain.":[83],"At":[84],"time":[86],"writing,":[89],"best":[93],"authors":[95],"knowledge,":[96],"scientific":[98],"literature":[99],"addressed":[100],"all":[101],"these":[103],"problems":[104],"almost":[105],"separately.":[106],"To":[107],"bridge":[108],"gap,":[110],"paper":[112,182],"proposes":[113],"novel":[115],"methodology,":[116],"properly":[117],"tailored":[118],"within":[119],"ETSI-NFV":[121],"framework.":[122],"From":[123,150],"one":[124],"side,":[125,152],"Software-Defined":[126],"Controllers":[127],"continuously":[128],"monitor":[129],"properties":[131],"performance":[134],"indicators":[135],"taken":[136],"from":[137],"networking":[138],"domains":[139],"available":[146],"in":[147],"architecture.":[149],"another":[151],"high-level":[154],"orchestrator":[155],"combines,":[156],"on":[157,170],"demand,":[158],"suitable":[160],"Functions":[163],"into":[164],"Chain,":[168],"based":[169],"user":[172],"requests,":[173],"targeted":[174],"requirements,":[176],"measured":[178],"levels.":[180],"concludes":[183],"by":[184],"further":[185],"explaining":[186],"functionalities":[188],"proposed":[191],"architecture":[192],"through":[193],"use":[195],"case.":[196]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
