Security requirements of network virtualization