References
- A Trend Micro Technical White Paper, "Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms", June 2015.
- J. Strassner, L. Dunbar, D. Lopez, E. Lopez, and R. Kumar, "Framework for Interface to Network Security Functions", Internet Engineering Task Force, Internet-Draft,draft-ietf-i2nsfframework-04, Oct. 2016, work in Progress.
- N. ETSI, "GS NFV-MAN 001 v1. 1.1 Network Function Virtualisation (NFV); management and orchestration", 2014.
- Interface to Network Security Functions (I2NSF) Working Group", Oct. 2014, https://datatracker.ietf.org/wg/i2nsf/charter/
- Susan Hares, Diego R. Lopex, Myo Zarny, Christian Jacquenet, Rakesh Kumar, Jaehoon Paul Jeong, "I2NSF Problem Statement and Use cases", Internet Engineering Task Force, Internet-Draft, draft-ietf-i2nsf-problem-and-usecases-06, Jan. 2017.
- Jaehoon (Paul) Jeong, "I2NSF Technology and Standardization Trend", OSIA Standards & Technology Review Journal, Vol. 28, No. 4, December 2015.
- Sanghak Oh, Eunsoo Kim, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, "A Flexible Architecture for Orchestrating Network Security Functions to Support High-Level Security Policies", ACM IMCOM(ICUIMC), Jan. 2017.
- Jeff Wilson, "Delivering Security Virtually Everywhere with SDN and NFV", IHS INFONETICS WHITE PAPER, Jul. 2015.