{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:03:54Z","timestamp":1742979834012,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319225715"},{"type":"electronic","value":"9783319225722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22572-2_10","type":"book-chapter","created":{"date-parts":[[2015,8,22]],"date-time":"2015-08-22T09:50:56Z","timestamp":1440237056000},"page":"139-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Invariant Preserving Middlebox Traversal"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Abujoda","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Papadimitriou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,23]]},"reference":[{"unstructured":"Internet2. http:\/\/www.internet2.edu\/","key":"10_CR1"},{"key":"10_CR2","volume-title":"Algorithms in C, Part 5: Graph Algorithms","author":"R Sedgewick","year":"2001","unstructured":"Sedgewick, R.: Algorithms in C, Part 5: Graph Algorithms, 3rd edn. Addison Wesley Professional, Upper Saddle River (2001)","edition":"3"},{"doi-asserted-by":"crossref","unstructured":"Enns, R.: NETCONF Configuration Protocol, RFC 4741, IETF, December 2006","key":"10_CR3","DOI":"10.17487\/rfc4741"},{"unstructured":"Stiemerling, M., Quittek, J., Cadar, C.: NEC\u2019s Simple Middlebox Configuration (SIMCO), RFC 4540. http:\/\/tools.ietf.org\/html\/rfc4540","key":"10_CR4"},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM CCR 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM CCR"},{"unstructured":"Kazemian, P., Varghese, G., McKeown, N.: Header space analysis: static checking for networks. In: USENIX NSDI, San Jose, CA, April 2012 (2012)","key":"10_CR6"},{"doi-asserted-by":"crossref","unstructured":"Stoenescu, R., Popovici, M., Negreanu, L., Raiciu, C.: Symnet: static checking for stateful networks. In: ACM HotMiddlebox (2013)","key":"10_CR7","DOI":"10.1145\/2535828.2535835"},{"unstructured":"Wischik, D., Raiciu, C., Greenhalgh, A., Handley, M.: Design, implementation and evaluation of congestion control for multipath tcp. In: USENIX NSDI (2011)","key":"10_CR8"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Qian, Z., Xu, Q., Mao, Z., Zhang, M.: An untold story of middleboxes in cellular networks. In: ACM SIGCOMM, Toronto, Canada, August 2011 (2011)","key":"10_CR9","DOI":"10.1145\/2018436.2018479"},{"unstructured":"Raiciu, C., Olteanu, V., Stoenescu, R.: Good cop, bad cop: forcing middleboxes to cooperate. In: IAB (2015)","key":"10_CR10"},{"doi-asserted-by":"crossref","unstructured":"Sherry, J., et al.: Making middleboxes someone elses problem: network processing as a cloud service. In: ACM SIGCOMM, Helsinki, Finland, August 2012 (2012)","key":"10_CR11","DOI":"10.1145\/2342356.2342359"},{"doi-asserted-by":"crossref","unstructured":"Fayazbakhsh, S., Sekar, V., Yu, M., Mogul, J.: FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In: ACM SIGCOMM HotSDN, Hong Kong, China, August 2013 (2013)","key":"10_CR12","DOI":"10.1145\/2491185.2491203"},{"unstructured":"Gember, A., et al.: Stratos: Virtual Middleboxes as First-Class Entities","key":"10_CR13"},{"doi-asserted-by":"crossref","unstructured":"Guha, S., Takeda, Y., Francis, P.: NUTSS: a SIP-based approach to UDP and TCP network connectivity. In: ACM SIGCOMM FDNA (2004)","key":"10_CR14","DOI":"10.1145\/1016707.1016715"},{"unstructured":"Eppinger, J.L.: TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem. http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/isri2005\/CMU-ISRI-05-104.pdf","key":"10_CR15"},{"unstructured":"Biggadike, A., Ferullo, D., Wilson, G., Perrig, A.: NATBLASTER: establishing TCP connections between hosts behind NATs. In: ACM SIGCOMM ASIA (2005)","key":"10_CR16"},{"unstructured":"Kho, W., Baset, S.A., Schulzrinne, H.: Skype relay calls: measurements and experiments. In: IEEE Global Internet Symposium (2008)","key":"10_CR17"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22572-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:33:43Z","timestamp":1676471623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22572-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319225715","9783319225722"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22572-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}