{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:42:57Z","timestamp":1757313777375,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129705"},{"type":"electronic","value":"9783030129712"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12971-2_6","type":"book-chapter","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T12:42:39Z","timestamp":1549024959000},"page":"96-112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Automated and Optimized Formal Approach to Verify SDN Access-Control Misconfigurations"],"prefix":"10.1007","author":[{"given":"Amina","family":"Sa\u00e2daoui","sequence":"first","affiliation":[]},{"given":"Nihel","family":"Ben Youssef Ben Souayeh","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,2]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Al-Haj, S.: Flowchecker: configuration analysis and verification of federated openflow infrastructures. In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, 4 October 2010, pp. 37\u201344 (2010)","DOI":"10.1145\/1866898.1866905"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Alimi, R., Wang, Y., Yang, Y.R.: Shadow configuration as a network management primitive. In: Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, 17\u201322 August 2008, pp. 111\u2013122 (2008)","DOI":"10.1145\/1402946.1402972"},{"issue":"6","key":"6_CR3","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1145\/2666356.2594317","volume":"49","author":"Thomas Ball","year":"2014","unstructured":"Ball, T.: Vericon: towards verifying controller programs in software-defined networks. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, Edinburgh, United Kingdom, 09\u201311 June 2014, pp. 282\u2013293 (2014)","journal-title":"ACM SIGPLAN Notices"},{"key":"6_CR4","unstructured":"Canini, M., Venzano, D., Peres\u00edni, P., Kostic, D., Rexford, J.: A NICE way to test openflow applications. In: Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012, San Jose, CA, USA, 25\u201327 April 2012, pp. 127\u2013140 (2012)"},{"key":"6_CR5","unstructured":"All-in-one sdn app development starter vm (2018)"},{"key":"6_CR6","unstructured":"Cisco open network environment for government (2018)"},{"key":"6_CR7","unstructured":"Feamster, N., Balakrishnan, H.: Detecting BGP configuration faults with static analysis (awarded best paper). In: Proceedings of 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, USA, 2\u20134 May 2005 (2005)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Foster, B., et al.: Frenetic: a network programming language. In: Proceeding of the 16th ACM SIGPLAN International Conference on Functional Programming, ICFP 2011, Tokyo, Japan, 19\u201321 September 2011, pp. 279\u2013291 (2011)","DOI":"10.1145\/2034773.2034812"},{"issue":"4","key":"6_CR9","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. 51(4), 1106\u20131120 (2007)","journal-title":"Comput. Netw."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Griffin, T., Wilfong, G.T.: On the correctness of IBGP configuration. In: Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 19\u201323 August 2002, Pittsburgh, PA, USA, pp. 17\u201329 (2002)","DOI":"10.1145\/964725.633028"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Hu, H., Han, W., Ahn, G.-J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN 2014, Chicago, Illinois, USA, 22 August 2014, pp. 97\u2013102 (2014)","DOI":"10.1145\/2620728.2620749"},{"key":"6_CR12","unstructured":"Kazemian, P., Chan, M., Zeng, H., Varghese, G., McKeown, N., Whyte, S.: Real time network policy checking using header space analysis. In: NSDI, pp. 99\u2013111. USENIX Association (2013)"},{"key":"6_CR13","unstructured":"Khurshid, A., Zou, X., Zhou, W., Caesar, M., Brighten Godfrey, P.: Veriflow: verifying network-wide invariants in real time. In: Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013, Lombard, IL, USA, 2\u20135 April 2013, pp. 15\u201327 (2013)"},{"key":"6_CR14","unstructured":"Limboole sat solver (2018)"},{"issue":"8","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TPDS.2007.70802","volume":"19","author":"AX Liu","year":"2008","unstructured":"Liu, A.X., Gouda, M.G.: Diverse firewall design. IEEE Trans. Parallel Distrib. Syst. (TPDS) 19(8), 1237\u20131251 (2008)","journal-title":"IEEE Trans. Parallel Distrib. Syst. (TPDS)"},{"issue":"2","key":"6_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: Openflow: enabling innovation in campus networks. Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"Comput. Commun. Rev."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Saadaoui, A., Ben Youssef Ben Souayeh, N., Bouhoula, A.: Formal approach for managing firewall misconfigurations. In: IEEE 8th International Conference on Research Challenges in Information Science, RCIS 2014, Marrakech, Morocco, 28\u201330 May 2014, pp. 1\u201310 (2014)","DOI":"10.1109\/RCIS.2014.6861044"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.jocs.2017.09.003","volume":"23","author":"A Sa\u00e2daoui","year":"2017","unstructured":"Sa\u00e2daoui, A., Ben Youssef Ben Souayeh, N., Bouhoula, A.: FARE: fdd-based firewall anomalies resolution tool. J. Comput. Sci. 23, 181\u2013191 (2017)","journal-title":"J. Comput. Sci."},{"key":"6_CR19","unstructured":"Wundsam, A., Levin, D., Seetharaman, S., Feldmann, A.: Ofrewind: enabling record and replay troubleshooting for networks. In: USENIX Annual Technical Conference. USENIX Association (2011)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Testbeds and Research Infrastructures for the Development of Networks and Communities"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12971-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:23:03Z","timestamp":1558401783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12971-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129705","9783030129712"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12971-2_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TridentCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Testbeds and Research Infrastructures","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tridentcom2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.wikicfp.com\/cfp\/servlet\/event.showcfp?eventid=76498&copyownerid=110304","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"http:\/\/confy.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}