1. Rami Cohen, Liane Lewin-Eytan, Joseph Seffi Naor, and Danny Raz. 2015. Near optimal placement of virtual network functions. In 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 1346–1354.
2. Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure;Das Sangjukta;IEEE Transactions on Industrial Informatics,2022
3. Identity and Access Control for micro-services based 5G NFV platforms
4. A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture
5. Junzuo Lai, Robert H Deng, and Yingjiu Li. 2011. Fully secure cipertext-policy hiding CP-ABE. In Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30–June 1, 2011. Proceedings 7. Springer, 24–39.