{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:10:27Z","timestamp":1775229027995,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642380815","type":"print"},{"value":"9783642380822","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38082-2_2","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T08:43:53Z","timestamp":1366620233000},"page":"16-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["The NEBULA Future Internet Architecture"],"prefix":"10.1007","author":[{"given":"Tom","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Ken","family":"Birman","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Broberg","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Caesar","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Comer","sequence":"additional","affiliation":[]},{"given":"Chase","family":"Cotton","sequence":"additional","affiliation":[]},{"given":"Michael J.","family":"Freedman","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[]},{"given":"Zachary G.","family":"Ives","sequence":"additional","affiliation":[]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[]},{"given":"William","family":"Lehr","sequence":"additional","affiliation":[]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[]},{"given":"David","family":"Mazi\u00e8res","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Nicolosi","sequence":"additional","affiliation":[]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[]},{"given":"Robbert","family":"van Renesse","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Walfish","sequence":"additional","affiliation":[]},{"given":"Hakim","family":"Weatherspoon","sequence":"additional","affiliation":[]},{"given":"Christopher S.","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Aditya, P., Zhao, M., Lin, Y., Haeberlen, A., Druschel, P., Maggs, B., Wishon, B.: Reliable client accounting for hybrid content-distribution networks. In: Proc. NSDI (April 2012)"},{"issue":"5","key":"2_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MIC.2011.122","volume":"15","author":"A. Agapi","year":"2011","unstructured":"Agapi, A., Birman, K., Broberg, R., Cotton, C., Kielmann, T., Millnert, M., Payne, R., Surton, R., van Renesse, R.: Routers for the Cloud: Can the Internet achieve 5-nines availability? IEEE Internet Computing\u00a015(5), 72\u201377 (2011)","journal-title":"IEEE Internet Computing"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Arye, M., Nordstr\u00f6m, E., Kiefer, R., Rexford, J., Freedman, M.J.: A provably-correct protocol for seamless communication with mobile, multi-homed hosts. Technical Report 1203.4042v1, arXiv (March 2012)","DOI":"10.1109\/ICNP.2012.6459961"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2011.387","volume":"12","author":"K.P. Birman","year":"2012","unstructured":"Birman, K.P., Huang, Q., Freedman, D.: Overcoming the \u201cD\u201d in CAP: Using Isis2 to build locally responsive cloud services. IEEE Internet Computing\u00a012, 50\u201358 (2012)","journal-title":"IEEE Internet Computing"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Birman, K.P.: Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services. Springer (2012)","DOI":"10.1007\/978-1-4471-2416-0"},{"key":"2_CR6","unstructured":"Birman, K.P., Ganesh, L., van Renesse, R.: Running smart grid control software on cloud computing architectures. In: Proc. Workshop on Computational Needs for the Next Generation Electric Grid (April 2011)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bod\u00edk, P., Menache, I., Chowdhury, M., Mani, P., Maltz, D.A., Stoica, I.: Surviving failures in bandwidth-constrained datacenters. In: Proc. SIGCOMM (2012)","DOI":"10.1145\/2342356.2342439"},{"key":"2_CR8","unstructured":"Broberg, R., Agapi, A., Birman, K., Comer, D., Cotton, C., Kielmann, T., Lehr, W., van Renesse, R., Surton, R., Smith, J.M.: Clouds, cable and connectivity: Future Internets and router requirements. In: Proc. Cable Connection Spring Technical Conference (June 2011)"},{"key":"2_CR9","unstructured":"Clark, D., Lehr, W., Bauer, S.: Interconnection in the internet: the policy challenge. In: Proc. 39th Research Conference on Communication, Information and Internet Policy (September 2013)"},{"key":"2_CR10","unstructured":"Comer, D., Javed, S.: Applying open resilient cluster management (orcm) to a multi-chassis core router. In: Proc. ISCA International Conference on Computers and Their Applications (March 2012)"},{"key":"2_CR11","unstructured":"Comer, D., Suingh, P., Vasudevan, S.: Towards a practical and effective BGP defense system. In: Proc. ICICS (January 2012)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Comer, D.: A future Internet architecture that supports Cloud Computing. In: Proc. 6th International Conference on Future Internet Technologies (June 2011)","DOI":"10.1145\/2002396.2002418"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Dobrescu, M., Egi, N., Argyraki, K., Chun, B.G., Fall, K., Iannaccone, G., Knies, A., Manesh, M., Ratnasamy, S.: RouteBricks: exploiting parallelism to scale software routers. In: Proc. SOSP (2009)","DOI":"10.1145\/1629575.1629578"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Foster, N., Freedman, M.J., Harrison, R., Monsanto, C., Reitblatt, M., Rexford, J., Story, A., Walker, D.: Language abstractions for software-defined networks. In: Proc. Workshop on Lang. for Distrib. Algorithms (2012)","DOI":"10.1109\/MCOM.2013.6461197"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Foster, N., Harrison, R., Freedman, M.J., Monsanto, C., Rexford, J., Story, A., Walker, D.: Frenetic: A network programming language. In: Proc. ICFP (2011)","DOI":"10.1145\/2034773.2034812"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Freedman, D., Marian, T., Lee, J., Birman, K., Weatherspoon, H., Xu, C.: Instrumentation for exact packet timings in networks. In: Proc. Instrumentation and Measurement Technology Conference (May 2011)","DOI":"10.1109\/IMTC.2011.5944016"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ghodsi, A., Sekar, V., Zaharia, M., Stoica, I.: Multi-resource fair queueing for packet processing. In: Proc. SIGCOMM (2012)","DOI":"10.21236\/ADA563900"},{"key":"2_CR18","unstructured":"Gupta, T., Leners, J.B., Aguilera, M.K., Walfish, M.: Exposing network failures to end-host applications for improved availability. In: Proc. NSDI (April 2013)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Gurney, A.J.T., Haeberlen, A., Zhou, W., Sherr, M., Loo, B.T.: Having your cake and eating it too: Routing security with privacy protections. In: Proc. HotNets (November 2011)","DOI":"10.1145\/2070562.2070577"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Handigol, N., Heller, B., Jeyakumar, V., Mazi\u00e9res, D., McKeown, N.: Where is the debugger for my Software-Defined Network? In: Proc. HotSDN (2012)","DOI":"10.1145\/2342441.2342453"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Hong, C.Y., Caesar, M., Duffield, N., Wang, J.: Tiresias: Online anomaly detection for hierarchical operational network data. In: Proc. ICDCS (2012)","DOI":"10.1109\/ICDCS.2012.30"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Hong, C.Y., Caesar, M., Godfrey, P.B.: Finishing flows quickly with preemptive scheduling. In: Proc. SIGCOMM (2012)","DOI":"10.1145\/2342356.2342389"},{"key":"2_CR23","unstructured":"Jeyakumar, V., Alizadeh, M., Mazi\u00e8res, D., Prabhakar, B., Kim, C.: EyeQ: Practical network performance isolation for the multi-tenant Cloud. In: Proc. HotCloud (2012)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Khurshid, A., Kiyak, F., Caesar, M.: Improving robustness of DNS to software vulnerabilities. In: Proc. ACSAC (2011)","DOI":"10.1145\/2076732.2076758"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.B.: VeriFlow: Verifying network-wide invariants in real time. In: Proc. HotSDN (2012)","DOI":"10.1145\/2342441.2342452"},{"key":"2_CR26","unstructured":"Lehr, W.: Measuring the Internet: The data challenge. OECD Digital Economy Papers, No. 194. OECD Publishing (2012)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Lehr, W., Clark, D., Bauer, S.: Measuring Internet performance when broadband is the new PSTN. Paper prepared for the \u201cEnd of PSTN\u201d Workshop at the University of Pennsylvania (May 2012)","DOI":"10.5325\/jinfopoli.3.2013.0411"},{"issue":"8","key":"2_CR28","doi-asserted-by":"publisher","first-page":"752","DOI":"10.14778\/2212351.2212357","volume":"5","author":"C. Liu","year":"2012","unstructured":"Liu, C., Ren, L., Loo, B.T., Mao, Y., Basu, P.: Cologne: A declarative distributed constraint optimization platform. Proc. VLDB Endowm.\u00a05(8), 752\u2013763 (2012)","journal-title":"Proc. VLDB Endowm."},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Liu, V., Han, S., Krishnamurthy, A., Anderson, T.: Tor instead of IP. In: Proc. HotNets (2011)","DOI":"10.1145\/2070562.2070576"},{"key":"2_CR30","unstructured":"Liu, V., Halperin, D., Krishnamurthy, A., Anderson, T.: F10: A fault-tolerant engineered network. In: Proc. NSDI (April 2013)"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Naous, J., Walfish, M., Nicolosi, A., Mazi\u00e8res, D., Miller, M., Seehra, A.: Verifying and enforcing network paths with ICING. In: Proc. CoNEXT (2011)","DOI":"10.1145\/2079296.2079326"},{"key":"2_CR32","unstructured":"Nordstr\u00f6m, E., Shue, D., Gopalan, P., Kiefer, R., Arye, M., Ko, S.Y., Rexford, J., Freedman, M.J.: Serval: An end-host stack for service-centric networking. In: Proc. NSDI (2012)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Popa, L., Krishnamurthy, A., Ratnasamy, S., Stoica, I.: FairCloud: Sharing the network in cloud computing. In: Proc. HotNets (2011)","DOI":"10.1145\/2342356.2342396"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Popa, L., Kumar, G., Chowdhury, M., Krishnamurthy, A., Ratnasamy, S., Stoica, I.: FairCloud: sharing the network in cloud computing. In: Proc. SIGCOMM (2012)","DOI":"10.1145\/2342356.2342396"},{"key":"2_CR35","unstructured":"Setty, S., McPherson, R., Blumberg, A.J., Walfish, M.: Making argument systems for outsourced computation practical (sometimes). In: Proc. NDSS (February 2012)"},{"key":"2_CR36","unstructured":"Setty, S., Vu, V., Panpalia, N., Braun, B., Blumberg, A.J., Walfish, M.: Taking proof-based verified computation a few steps closer to practicality. In: Proc. USENIX Security (2012)"},{"issue":"6","key":"2_CR37","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1109\/TNET.2012.2187924","volume":"20","author":"A. Wang","year":"2012","unstructured":"Wang, A., Jia, L., Zhou, W., Ren, Y., Loo, B.T., Rexford, J., Nigam, V., Scedrov, A., Talcott, C.: FSR: Formal analysis and implementation toolkit for safe interdomain routing. IEEE\/ACM Transactions on Networking (ToN)\u00a020(6), 1814\u20131827 (2012)","journal-title":"IEEE\/ACM Transactions on Networking (ToN)"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Wang, A., Talcott, C., Gurney, A.J., Loo, B.T., Scedrov, A.: Brief announcement: A calculus of policy-based routing systems. In: Proc. PODC (July 2012)","DOI":"10.1145\/2332432.2332501"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Williams, D., Jamjoom, H., Weatherspoon, H.: The Xen-Blanket: Virtualize once, run everywhere. In: Proc. EuroSys (2012)","DOI":"10.1145\/2168836.2168849"},{"issue":"4","key":"2_CR40","first-page":"405","volume":"38","author":"C.S. Yoo","year":"2011","unstructured":"Yoo, C.S.: Cloud computing: Architecturand and policy implications. Review of Industrial Economics\u00a038(4), 405\u2013421 (2011)","journal-title":"Review of Industrial Economics"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Zhao, M., Zhou, W., Gurney, A.J.T., Haeberlen, A., Sherr, M., Loo, B.T.: Private and verifiable interdomain routing decisions. In: Proc. SIGCOMM (August 2012)","DOI":"10.1145\/2342356.2342434"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Zhou, W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure network provenance. In: Proc. SOSP (October 2011)","DOI":"10.1145\/2043556.2043584"}],"container-title":["Lecture Notes in Computer Science","The Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38082-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T14:20:08Z","timestamp":1737123608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38082-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380815","9783642380822"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38082-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}