1. [1] T. Mano, K. Mizutani, and O. Akashi, “Secure resource provisioning across multiple domains,” Proc. IFIP/IEEE IM, pp.1129-1134, May 2013.
2. [2] N.M.M.K. Chowdhury and R. Boutaba, “Network virtualization: State of the art and research challenges,” IEEE Commun. Mag., vol.47, no.7, pp.20-26, 2009.
3. [3] A. Fischer, J. Botero, M. Till Beck, H. de Meer, and X. Hesselbach, “Virtual network embedding: A survey,” IEEE Commun. Surveys Tuts., vol.15, no.4, pp.1888-1906, 2013.
4. [4] A. Belbekkouche, M.M. Hasan, and A. Karmouch, “Resource discovery and allocation in network virtualization,” IEEE Commun. Surveys Tuts., vol.14, no.4, pp.1114-1128, 2012.
5. [5] J. Turner and D. Taylor, “Diversifying the Internet,” Proc. IEEE GLOBECOM, vol.2, pp.755-760, 2005.