2021
DOI: 10.1016/j.comcom.2021.03.024
|View full text |Cite
|
Sign up to set email alerts
|

Security policies definition and enforcement utilizing policy control function framework in 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…In the same line, many other examples of Network Slices with other security attributes may be built in the network. This approach responds to our previous studies that require a more comprehensive, even if more complex, response to security in a network with many underlying infrastructures [7,8].…”
Section: Network Slices With Security Constraints: An Examplementioning
confidence: 63%
See 1 more Smart Citation
“…In the same line, many other examples of Network Slices with other security attributes may be built in the network. This approach responds to our previous studies that require a more comprehensive, even if more complex, response to security in a network with many underlying infrastructures [7,8].…”
Section: Network Slices With Security Constraints: An Examplementioning
confidence: 63%
“…It takes effect in that when we consider different underlying technologies, many researchers have required a more comprehensive approach to security. We also support this request in our prior research studies [7,8]. In the proposal shown in this paper, we propose a comprehensive selection with the definition of the classes of the parameters that impact slice security so that those parameters may be included in slice specification and be part of the orchestration procedure for initiating the slice configuration.…”
Section: Introductionmentioning
confidence: 83%
“…(2) non-RT RIC for RAN optimization; and (3) O-Cloud management, orchestration, and workflow management. As shown in many publications, security and accountability are crucial issues of the Open RAN initiative [18,19].…”
Section: Smo (Service Management and Orchestration)mentioning
confidence: 99%