NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2022
DOI: 10.1109/noms54207.2022.9789911
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Access Control Deployment in Network Function Virtualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…A notable feature of this study resided in its practical application and comprehensive evaluation carried out within the context of the SONATA service platform. Simultaneously, Smine et al [17] proposed an innovative approach for the correct and optimal deployment of access control policies in NFV services. The approach considered a robust insider adversary model capable of compromising one or multiple VNFs within the Management and Orchestration (MANO) framework.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A notable feature of this study resided in its practical application and comprehensive evaluation carried out within the context of the SONATA service platform. Simultaneously, Smine et al [17] proposed an innovative approach for the correct and optimal deployment of access control policies in NFV services. The approach considered a robust insider adversary model capable of compromising one or multiple VNFs within the Management and Orchestration (MANO) framework.…”
Section: Related Workmentioning
confidence: 99%
“…Prior investigations in the field of NFV resource sharing have notably neglected the examination of robust access control strategies, despite their pivotal significance. Other research on access control [15][16][17][18] primarily focuses on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC). To ensure precise subject identification and verification within the NFV system, trusted identity management and authentication mechanisms are commonly deployed.…”
Section: Introductionmentioning
confidence: 99%