2019 IEEE Conference on Network Softwarization (NetSoft) 2019
DOI: 10.1109/netsoft.2019.8806655
|View full text |Cite
|
Sign up to set email alerts
|

A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The Verifier relies on a trusted signatures database to appraise the trust level of a received token. Several works leverage Trust Computing technologies for SPIV [43], [50]- [52].…”
Section: Software Package Integrity Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…The Verifier relies on a trusted signatures database to appraise the trust level of a received token. Several works leverage Trust Computing technologies for SPIV [43], [50]- [52].…”
Section: Software Package Integrity Verificationmentioning
confidence: 99%
“…To address such a challenge, Trust Monitor (TM) [50] leverages attestation drivers as plugins to implement remote attestation workflows for various RoTs, including TPM, Intel SGX, and AMD SEV. Furthermore, TM's framework integrates within the NFV MANO as a stand-alone module.…”
Section: Software Package Integrity Verificationmentioning
confidence: 99%
“…Because the system includes various operators, certainly, the cooperation of these operators can be imperfect and every element may conduct in a greedy or uncooperative manner for gaining benefits. The NFV virtualization attacks can be originated from each element and may target part or all of the system [5].…”
Section: Nfv Security Threats and Solutionsmentioning
confidence: 99%