{"id":"https://openalex.org/W3118413215","doi":"https://doi.org/10.3390/fi13010012","title":"Design and Implementation of Virtual Security Function Based on Multiple Enclaves","display_name":"Design and Implementation of Virtual Security Function Based on Multiple Enclaves","publication_year":2021,"publication_date":"2021-01-06","ids":{"openalex":"https://openalex.org/W3118413215","doi":"https://doi.org/10.3390/fi13010012","mag":"3118413215"},"language":"en","primary_location":{"id":"doi:10.3390/fi13010012","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi13010012","pdf_url":"https://www.mdpi.com/1999-5903/13/1/12/pdf?version=1610067362","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/13/1/12/pdf?version=1610067362","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100347410","display_name":"Juan Wang","orcid":"https://orcid.org/0000-0001-8813-7842"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juan Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"],"raw_orcid":"https://orcid.org/0000-0001-8813-7842","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080897915","display_name":"Yang Yu","orcid":"https://orcid.org/0000-0001-8612-022X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Yu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"],"raw_orcid":"https://orcid.org/0000-0001-8612-022X","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090676285","display_name":"Yi Li","orcid":"https://orcid.org/0000-0002-6420-653X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Li","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046020309","display_name":"Chengyang Fan","orcid":"https://orcid.org/0000-0003-1573-4982"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengyang Fan","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054154425","display_name":"Shirong Hao","orcid":"https://orcid.org/0000-0002-3567-8255"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shirong Hao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100347410"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.961,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.7598461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"13","issue":"1","first_page":"12","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8832910060882568},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.8045871257781982},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.6050978302955627},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5819045901298523},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.5573161840438843},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4654897451400757},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4605637192726135},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.44851425290107727},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.44331467151641846},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4299395680427551},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4134986698627472},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4033809304237366},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3888664245605469},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3764885663986206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8832910060882568},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.8045871257781982},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.6050978302955627},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5819045901298523},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.5573161840438843},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4654897451400757},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4605637192726135},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.44851425290107727},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.44331467151641846},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4299395680427551},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4134986698627472},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4033809304237366},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3888664245605469},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3764885663986206},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi13010012","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi13010012","pdf_url":"https://www.mdpi.com/1999-5903/13/1/12/pdf?version=1610067362","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:13:y:2021:i:1:p:12-:d:475887","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/13/1/12/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:89318eb3bc364c45a95be5e90f6ed2af","is_oa":true,"landing_page_url":"https://doaj.org/article/89318eb3bc364c45a95be5e90f6ed2af","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 13, Iss 1, p 12 (2021)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/13/1/12/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/fi13010012","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet; Volume 13; Issue 1; Pages: 12","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi13010012","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi13010012","pdf_url":"https://www.mdpi.com/1999-5903/13/1/12/pdf?version=1610067362","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3190413376","display_name":null,"funder_award_id":"No.61872430, 61402342, 61772384","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4496083886","display_name":null,"funder_award_id":"No. KJ-17-103","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"},{"id":"https://openalex.org/G8719610264","display_name":null,"funder_award_id":"No.2014CB340601","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327655","display_name":"Foundation of Science and Technology on Information Assurance Laboratory","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3118413215.pdf","grobid_xml":"https://content.openalex.org/works/W3118413215.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W86730287","https://openalex.org/W1435010830","https://openalex.org/W1729172517","https://openalex.org/W2003728624","https://openalex.org/W2010365467","https://openalex.org/W2014386918","https://openalex.org/W2057439722","https://openalex.org/W2066089879","https://openalex.org/W2089194229","https://openalex.org/W2153185479","https://openalex.org/W2312902414","https://openalex.org/W2465005408","https://openalex.org/W2498885363","https://openalex.org/W2504074749","https://openalex.org/W2533941064","https://openalex.org/W2561955909","https://openalex.org/W2576622268","https://openalex.org/W2599829375","https://openalex.org/W2600318748","https://openalex.org/W2790063371","https://openalex.org/W2792654696","https://openalex.org/W2799154389","https://openalex.org/W2806041759","https://openalex.org/W2892214024","https://openalex.org/W2903166669","https://openalex.org/W2918840401","https://openalex.org/W3047708329","https://openalex.org/W6730426483","https://openalex.org/W6751063601"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W2743348030","https://openalex.org/W2947629119","https://openalex.org/W1963799338","https://openalex.org/W2542775576","https://openalex.org/W2900408237","https://openalex.org/W2036412865","https://openalex.org/W2906562101","https://openalex.org/W2545334782","https://openalex.org/W2160597328"],"abstract_inverted_index":{"Network":[0],"function":[1,9,113,179,194],"virtualization":[2],"(NFV)":[3],"provides":[4,62],"flexible":[5],"and":[6,21,36,49,70,105,133,149,217],"scalable":[7],"network":[8,34,74],"for":[10],"the":[11,16,51,96,110,122,151,154,172,177,184,193,212,225,229],"emerging":[12],"platform,":[13],"such":[14,30],"as":[15,31],"cloud":[17],"computing,":[18,20],"edge":[19],"IoT":[22],"platforms,":[23],"while":[24,156],"it":[25],"faces":[26],"more":[27],"security":[28,112],"challenges,":[29],"tampering":[32],"with":[33],"policies":[35],"leaking":[37],"sensitive":[38,80,123],"processing":[39],"states,":[40],"due":[41],"to":[42,66,108,146,170,174,190,210],"running":[43,159],"in":[44,90],"a":[45,63,68,91,126,166],"shared":[46],"open":[47],"environment":[48],"lacking":[50],"protection":[52],"of":[53,99,125,153,195,214],"proprietary":[54],"hardware.":[55],"Currently,":[56],"Intel\u00ae":[57],"Software":[58],"Guard":[59],"Extensions":[60],"(SGX)":[61],"promising":[64],"way":[65],"build":[67],"secure":[69],"trusted":[71],"VNF":[72,78,127],"(virtual":[73],"function)":[75],"by":[76,135,228],"isolating":[77],"or":[79],"data":[81],"into":[82,130],"an":[83,201,234],"enclave.":[84],"However,":[85],"directly":[86],"placing":[87],"multiple":[88,117],"VNFs":[89,186,196],"single":[92],"enclave":[93],"will":[94],"lose":[95],"scalability":[97,152],"advantage":[98],"NFV.":[100],"This":[101],"paper":[102],"combines":[103],"SGX":[104],"click":[106],"technology":[107],"design":[109,165],"virtual":[111],"architecture":[114,209,231],"based":[115,206],"on":[116,207],"enclaves.":[118],"In":[119,162],"our":[120,208,215],"design,":[121],"modules":[124,144],"are":[128],"put":[129],"different":[131],"enclaves":[132],"communicate":[134],"local":[136],"attestation.":[137],"The":[138,221],"system":[139,155,173,216,230],"can":[140],"freely":[141],"combine":[142],"these":[143],"according":[145],"user":[147],"requirements,":[148],"increase":[150],"protecting":[157],"its":[158,219],"state":[160],"security.":[161],"addition,":[163],"we":[164],"new":[167],"hot-swapping":[168],"scheme":[169],"enable":[171],"dynamically":[175],"modify":[176],"configuration":[178],"at":[180],"runtime,":[181],"so":[182],"that":[183,224],"original":[185],"do":[187],"not":[188],"need":[189],"stop":[191],"when":[192],"is":[197,232],"modified.":[198],"We":[199],"implement":[200],"IDS":[202],"(intrusion":[203],"detection":[204],"system)":[205],"verify":[211],"feasibility":[213],"evaluate":[218],"performance.":[220],"results":[222],"show":[223],"overhead":[226],"introduced":[227],"within":[233],"acceptable":[235],"range.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
