{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:57:50Z","timestamp":1743033470643,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030324087"},{"type":"electronic","value":"9783030324094"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32409-4_5","type":"book-chapter","created":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:03:00Z","timestamp":1572220980000},"page":"69-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Reo Model of Software Defined Networks"],"prefix":"10.1007","author":[{"given":"Hui","family":"Feng","sequence":"first","affiliation":[]},{"given":"Farhad","family":"Arbab","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Bonsangue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-3-319-95582-7_33","volume-title":"Formal Methods","author":"E Albert","year":"2018","unstructured":"Albert, E., G\u00f3mez-Zamalloa, M., Rubio, A., Sammartino, M., Silva, A.: SDN-actors: modeling and verification of SDN programs. In: Havelund, K., Peleska, J., Roscoe, B., de Vink, E. (eds.) FM 2018. LNCS, vol. 10951, pp. 550\u2013567. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95582-7_33"},{"issue":"1","key":"5_CR2","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/2578855.2535862","volume":"49","author":"CJ Anderson","year":"2014","unstructured":"Anderson, C.J., et al.: NetKAT: semantic foundations for networks. ACM Sigplan Not. 49(1), 113\u2013126 (2014)","journal-title":"ACM Sigplan Not."},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1017\/S0960129504004153","volume":"14","author":"F Arbab","year":"2004","unstructured":"Arbab, F.: Reo: a channel-based coordination model for component composition. Math. Struct. Comput. Sci. 14(3), 329\u2013366 (2004)","journal-title":"Math. Struct. Comput. Sci."},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-30734-3_7","volume-title":"Theory and Practice of Formal Methods","author":"F Arbab","year":"2016","unstructured":"Arbab, F.: Proper protocol. In: \u00c1brah\u00e1m, E., Bonsangue, M., Johnsen, E.B. (eds.) Theory and Practice of Formal Methods. LNCS, vol. 9660, pp. 65\u201387. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30734-3_7"},{"key":"5_CR5","unstructured":"Arbab, F., Koehler, C., Maraikar, Z., Moon, Y.J., Proen\u00e7a, J.: Modeling, testing and executing Reo connectors with the eclipse coordination tools. Presented at the 5th International Workshop on Formal Aspects of Component Systems (2008)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Arbab, F., Meng, S., Moon, Y.J., Kwiatkowska, M., Qu, H.: Reo2MC: a tool chain for performance analysis of coordination models. In: van Vliet, H., Issarny, V. (eds.) Proceedings of the of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 287\u2013288. ACM (2009)","DOI":"10.1145\/1595696.1595745"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.scico.2005.10.008","volume":"61","author":"C Baier","year":"2006","unstructured":"Baier, C., Sirjani, M., Arbab, F., Rutten, J.: Modeling component connectors in Reo by constraint automata. Sci. Comput. Program. 61(2), 75\u2013113 (2006)","journal-title":"Sci. Comput. Program."},{"issue":"6","key":"5_CR8","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1145\/2666356.2594317","volume":"49","author":"T Ball","year":"2014","unstructured":"Ball, T., et al.: Vericon: towards verifying controller programs in software-defined networks. SIGPLAN Not. 49(6), 282\u2013293 (2014)","journal-title":"SIGPLAN Not."},{"key":"5_CR9","unstructured":"Casado, M., et al.: SANE: a protection architecture for enterprise networks. In: Keromytis, A.D. (ed.) USENIX Security Symposium, p. 50. USENIX Association (2006)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-030-04771-9_25","volume-title":"Software Technologies: Applications and Foundations","author":"R Cruz","year":"2018","unstructured":"Cruz, R., Proen\u00e7a, J.: ReoLive: analysing connectors in your browser. In: Mazzara, M., Ober, I., Sala\u00fcn, G. (eds.) STAF 2018. LNCS, vol. 11176, pp. 336\u2013350. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04771-9_25"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.entcs.2005.12.064","volume":"159","author":"F Ghassemi","year":"2006","unstructured":"Ghassemi, F., Tasharofi, S., Sirjani, M.: Automated mapping of Reo circuits to constraint automata. Electron. Notes Theor. Comput. Sci. 159, 99\u2013115 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85762-4_11","volume-title":"Theoretical Aspects of Computing - ICTAC 2008","author":"M Izadi","year":"2008","unstructured":"Izadi, M., Bonsangue, M.M.: Recasting constraint automata into B\u00fcchi automata. In: Fitzgerald, J.S., Haxthausen, A.E., Yenigun, H. (eds.) ICTAC 2008. LNCS, vol. 5160, pp. 156\u2013170. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85762-4_11"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.scico.2017.03.006","volume":"146","author":"SS Jongmans","year":"2017","unstructured":"Jongmans, S.S., Kapp\u00e9, T., Arbab, F.: Constraint automata with memory cells and their composition. Sci. Comput. Program. 146, 50\u201386 (2017)","journal-title":"Sci. Comput. Program."},{"key":"5_CR14","unstructured":"Jongmans, S.S.T.Q.: Automata-theoretic protocol programming. Ph.D. thesis, Leiden University (2016)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Kang, M., et al.: Formal modeling and verification of SDN-openflow. In: 6th International Conference on Software Testing, Verification and Validation, pp. 481\u2013482. IEEE (2013)","DOI":"10.1109\/ICST.2013.69"},{"key":"5_CR16","unstructured":"Kim, Y.M., Kang, M., Choi, J.Y.: Formal specification and verification of firewall using TLA+. In: Daimi, K., Arabnia, H.R. (eds.) Proceedings of the International Conference on Security and Management (SAM), pp. 247\u2013251 (2017)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Kokash, N., Krause, C., de Vink, E.P.: Data-aware design and verification of service compositions with Reo and mCRL2. In: Shin, S.Y., Ossowski, S., Schumacher, M., Palakal, M.J., Hung, C. (eds.) Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 2406\u20132413. ACM (2010)","DOI":"10.1145\/1774088.1774590"},{"key":"5_CR18","unstructured":"Lamport, L.: Specifying Systems, The TLA+ Language and Tools for Hardware and Software Engineers. Addison-Wesley (2002)"},{"issue":"2","key":"5_CR19","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: Openflow: enabling innovation in campus networks. Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"Comput. Commun. Rev."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Proen\u00e7a, J., Clarke, D., De Vink, E., Arbab, F.: Dreams: a framework for distributed synchronous coordination. In: Ossowski, S., Lecca, P. (eds.) Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1510\u20131515. ACM (2012)","DOI":"10.1145\/2245276.2232017"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Reitblatt, M., Canini, M., Guha, A., Foster, N.: FatTire: declarative fault tolerance for software-defined networks. In: Foster, N., Sherwood, R. (eds.) Proceedings of the 2nd ACM SIGCOMM Workshop on Hot topics in Software Defined Networking, pp. 109\u2013114. ACM (2013)","DOI":"10.1145\/2491185.2491187"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Schnepf, N., Badonnel, R., Lahmadi, A., Merz, S.: Automated verification of security chains in software-defined networks with synaptic. In: 2017 IEEE Conference on Network Softwarization (NetSoft), pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/NETSOFT.2017.8004195"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Soul\u00e9, R., et al.: Merlin: a language for provisioning network resources. In: Seneviratne, A., Diot, C., Kurose, J., Chaintreau, A., Rizzo, L. (eds.) Proceedings of the 10th ACM International Conference on Emerging Networking Experiments and Technologies, pp. 213\u2013226. ACM (2014)","DOI":"10.1145\/2674005.2674989"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Xiang, S., Zhu, H., Xiao, L., Xie, W.: Modeling and verifying TopoGuard in OpenFlow-based software defined networks. In: Pang, J., Zhang, C., He, J., Weng, J. (eds.) 2018 International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 84\u201391. IEEE Computer Society (2018)","DOI":"10.1109\/TASE.2018.00019"},{"issue":"7","key":"5_CR25","doi-asserted-by":"publisher","first-page":"398","DOI":"10.3103\/S0146411614070165","volume":"48","author":"VA Zakharov","year":"2014","unstructured":"Zakharov, V.A., Smelyansky, R.L., Chemeritsky, E.V.: A formal model and verification problems for software defined networks. Autom. Control. Comput. Sci. 48(7), 398\u2013406 (2014)","journal-title":"Autom. Control. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32409-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,26]],"date-time":"2021-01-26T05:15:06Z","timestamp":1611638106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32409-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030324087","9783030324094"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32409-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICFEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Engineering Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icfem2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csse.szu.edu.cn\/icfem2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}