{"id":"https://openalex.org/W2886276651","doi":"https://doi.org/10.1145/3229616.3229624","title":"Offloading Security Services to the Cloud Infrastructure","display_name":"Offloading Security Services to the Cloud Infrastructure","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2886276651","doi":"https://doi.org/10.1145/3229616.3229624","mag":"2886276651"},"language":"en","primary_location":{"id":"doi:10.1145/3229616.3229624","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3229616.3229624","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3229616.3229624","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3229616.3229624","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082578072","display_name":"Paul Chaignon","orcid":null},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Paul Chaignon","raw_affiliation_strings":["Orange Labs, Inria Nancy Grand Est"],"affiliations":[{"raw_affiliation_string":"Orange Labs, Inria Nancy Grand Est","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I19370010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071209191","display_name":"Diane Adjavon","orcid":null},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]},{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Diane Adjavon","raw_affiliation_strings":["Eurecom, Orange Labs"],"affiliations":[{"raw_affiliation_string":"Eurecom, Orange Labs","institution_ids":["https://openalex.org/I1902872","https://openalex.org/I19370010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017263819","display_name":"Kahina Lazri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kahina Lazri","raw_affiliation_strings":["Orange Labs"],"affiliations":[{"raw_affiliation_string":"Orange Labs","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035034365","display_name":"J\u00e9r\u00f4me Fran\u00e7ois","orcid":"https://orcid.org/0000-0002-7457-458X"},"institutions":[{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"J\u00e9r\u00f4me Fran\u00e7ois","raw_affiliation_strings":["Inria Nancy Grand Est"],"affiliations":[{"raw_affiliation_string":"Inria Nancy Grand Est","institution_ids":["https://openalex.org/I4210127166"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080464551","display_name":"Olivier Festor","orcid":"https://orcid.org/0000-0002-3181-7967"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Olivier Festor","raw_affiliation_strings":["Inria Nancy Grand Est, Telecom Nancy, Univesity of Lorraine"],"affiliations":[{"raw_affiliation_string":"Inria Nancy Grand Est, Telecom Nancy, Univesity of Lorraine","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082578072"],"corresponding_institution_ids":["https://openalex.org/I19370010","https://openalex.org/I4210127166"],"apc_list":null,"apc_paid":null,"fwci":0.84904859,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.74528862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7509487271308899},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6871965527534485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6118937134742737},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5561926364898682},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5011577606201172},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4599345028400421},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.42754819989204407},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3886866867542267},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1534658968448639},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08196219801902771}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7509487271308899},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6871965527534485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6118937134742737},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5561926364898682},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5011577606201172},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4599345028400421},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.42754819989204407},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3886866867542267},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1534658968448639},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08196219801902771},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3229616.3229624","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3229616.3229624","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3229616.3229624","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3229616.3229624","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3229616.3229624","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3229616.3229624","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2886276651.pdf","grobid_xml":"https://content.openalex.org/works/W2886276651.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W1436965661","https://openalex.org/W1979866793","https://openalex.org/W2134929016","https://openalex.org/W2142972529","https://openalex.org/W2147890514","https://openalex.org/W2150769115","https://openalex.org/W2347800168","https://openalex.org/W2604815149","https://openalex.org/W2790508427","https://openalex.org/W2799154389","https://openalex.org/W2887743632","https://openalex.org/W2941999324","https://openalex.org/W3102982213"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W4401658540"],"abstract_inverted_index":{"Cloud":[0],"applications":[1,71],"rely":[2],"on":[3,30],"a":[4],"diverse":[5],"set":[6],"of":[7,21],"security":[8,53],"services":[9,23],"from":[10],"application-layer":[11],"rate-limiting":[12],"to":[13,37,41,58,69],"TCP":[14],"SYN":[15],"cookies":[16],"and":[17,44],"application":[18],"firewalls.":[19],"Some":[20],"these":[22],"are":[24,66],"implemented":[25],"at":[26,60],"the":[27,31,35,49,61,70],"infrastructure":[28,62],"layer,":[29],"host":[32],"or":[33],"in":[34],"NIC,":[36],"filter":[38],"attacks":[39],"closer":[40],"their":[42],"source":[43],"free":[45],"CPU":[46],"cycles":[47],"for":[48],"tenants'":[50],"applications.":[51],"Most":[52],"services,":[54],"however,":[55],"remain":[56],"difficult":[57],"implement":[59],"layer":[63],"because":[64],"they":[65,72],"closely":[67],"tied":[68],"protect.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
