{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:43:08Z","timestamp":1766137388121},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440404"},{"type":"electronic","value":"9783030440411"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44041-1_75","type":"book-chapter","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T19:02:51Z","timestamp":1585335771000},"page":"858-870","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Bottom-Up Approach for Extracting Network Intents"],"prefix":"10.1007","author":[{"given":"Rafael Hengen","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Arthur Selle","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Parizotto","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Zembruzki","sequence":"additional","affiliation":[]},{"given":"Alberto Egon","family":"Schaeffer-Filho","sequence":"additional","affiliation":[]},{"given":"Lisandro Zambenedetti","family":"Granville","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,28]]},"reference":[{"key":"75_CR1","doi-asserted-by":"publisher","unstructured":"Jacobs, A.S., Pfitscher, R.J., Ferreira, R.A., Granville, L.Z.: Refining network intents for self-driving networks. In: Proceedings of the Afternoon Workshop on Self-Driving Networks ser. SelfDN 2018, pp. 15\u201321. ACM, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3229584.3229590","DOI":"10.1145\/3229584.3229590"},{"key":"75_CR2","doi-asserted-by":"crossref","unstructured":"Scheid, E.J., Machado, C.C., Franco, M.F., dos Santos, R.L., Pfitscher, R.P., Schaeffer-Filho, A.E., Granville, L.Z.: INSpIRE: Integrated NFV-based Intent Refinement Environment. In: 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 186\u2013194, May 2017","DOI":"10.23919\/INM.2017.7987279"},{"key":"75_CR3","doi-asserted-by":"crossref","unstructured":"Tian, B., Zhang, X., Zhai, E., Liu, H.H., Ye, Q., Wang, C., Wu, X.: Safely and automatically updating in-network ACL configurations with intent language. In: SIGCOMM 2019 Proceedings of the 2019 Conference of the ACM Special Interest Group on Data Communication (2019)","DOI":"10.1145\/3341302.3342088"},{"key":"75_CR4","doi-asserted-by":"crossref","unstructured":"Bodei, C., Degano, P., Galletta, L., Focardi, R., Tempesta, M., Veronese, L.: Language-independent synthesis of firewall policies. In: 2018 IEEE European Symposium on Security and Privacy (EuroS P), pp. 92\u2013106, April 2018","DOI":"10.1109\/EuroSP.2018.00015"},{"key":"75_CR5","doi-asserted-by":"crossref","unstructured":"Diekmann, C., Michaelis, J., Haslbeck, M., Carle, G.: Verified iptables firewall analysis. In: 2016 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 252\u2013260, May 2016","DOI":"10.1109\/IFIPNetworking.2016.7497196"},{"key":"75_CR6","unstructured":"Tongaonkar, A., Inamdar, N., Sekar, N.: Inferring higher level policies from firewall rules. In: Proceedings of the 21st Conference on Large Installation System Administration Conference ser. LISA 2007, Berkeley, CA, USA: USENIX Association, pp. 2:1\u20132:10 (2007) \nhttp:\/\/dl.acm.org\/citation.cfm?id=1349426.1349428"},{"key":"75_CR7","doi-asserted-by":"publisher","unstructured":"Mart\u00ednez, S., Cabot, J., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N.: A Model-driven approach for the extraction of network access-control policies. In: Proceedings of the Workshop on Model-Driven Security ser. MDsec 2012, pp. 5:1\u20135:6. ACM, New York (2012). \nhttps:\/\/doi.org\/10.1145\/2422498.2422503","DOI":"10.1145\/2422498.2422503"},{"key":"75_CR8","doi-asserted-by":"publisher","unstructured":"Abhashkumar, A., Kang, J.-M., Banerjee, S., Akella, A., Zhang, Y., Wu, W.: Supporting diverse dynamic intent-based policies using janus. In: Proceedings of the 13th International Conference on Emerging Networking EXperiments and Technologies ser. CoNEXT 2017, pp. 296\u2013309. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3143361.3143380","DOI":"10.1145\/3143361.3143380"},{"key":"75_CR9","unstructured":"Birkner, R., Drachsler-Cohen, D., Vanbever, L., Vechev, M.: Net2Text: query-guided summarization of network forwarding behaviors. In: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), Renton, WA: USENIX Association, pp. 609\u2013623, April 2018. \nhttps:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/birkner"},{"key":"75_CR10","unstructured":"Service Name and Transport Protocol Port Number Registry. \nhttps:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml"},{"issue":"2","key":"75_CR11","first-page":"173","volume":"22","author":"E Dart","year":"2014","unstructured":"Dart, E., Rotman, L., Tierney, B., Hester, M., Zurawski, J.: The science DMZ: a network design pattern for data-intensive science. Sci. Program. 22(2), 173\u2013185 (2014)","journal-title":"Sci. Program."}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44041-1_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T19:30:55Z","timestamp":1585337455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44041-1_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440404","9783030440411"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44041-1_75","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caserta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0d","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}