In an embodiment, a third segment of each of the multi-segment filenames 108A, 1088 may comprise information including a hash of a binary code associated with the executable instructions identified in the second segment of the multi-segment filename 108A, 108B. The third segment of the multi-segment filename 108A, 108B may be used to confirm that executable instructions received from network 112 and identified in the second segment of each multi-segment filename 108A, 1088 has not been tampered with or otherwise corrupted. Additionally, in an embodiment, the third segment of each multi-segment filename 108A, 1088 may include a copy of the binary code itself for running the instantiated network slice along with a hash of the binary code. Although the provider of network 112 is described above as creating the network slice artifacts 106A, 1068, it may be understood that actors other than the provider of network 112 may create and/or deliver the network slice artifact 106A, 1068 to the user. For example, a separate software developer independent of the provider of network 112 may create the network slice artifact and sell or license the created network slice artifact to the user.