{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:14:56Z","timestamp":1725567296201},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/noms.2016.7502996","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T17:07:22Z","timestamp":1467652042000},"page":"1249-1252","source":"Crossref","is-referenced-by-count":3,"title":["Private VNFs for collaborative multi-operator service delivery: An architectural case"],"prefix":"10.1109","author":[{"given":"Gergely","family":"Biczok","sequence":"first","affiliation":[]},{"given":"Balazs","family":"Sonkoly","sequence":"additional","affiliation":[]},{"given":"Nikolett","family":"Bereczky","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"303","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"journal-title":"Design and Implementation of a Homomophic-Encryption Library","year":"2013","author":"halevi","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32498-7_10"},{"key":"ref14","first-page":"949","article-title":"Private processing of outsourced network functions: Feasibility and constructions","author":"melis","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"SaaS Video Solution","year":"0","author":"nuage","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2790041"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417869"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502105"},{"year":"2012","key":"ref4"},{"year":"0","key":"ref3"},{"year":"2015","key":"ref6"},{"year":"2014","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref7","article-title":"5G Exchange (5GEx) &#x2013; Multi-domain Orchestration for Software Defined Infrastructures","author":"bernardos","year":"2015","journal-title":"EUCNC"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"journal-title":"Intel lets you manipulate encrypted data","year":"2012","author":"demerjian","key":"ref9"}],"event":{"name":"NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2016,4,25]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2016,4,29]]}},"container-title":["NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7499631\/7502779\/07502996.pdf?arnumber=7502996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T22:21:13Z","timestamp":1475187673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/noms.2016.7502996","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}