{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:24:49Z","timestamp":1774437889927,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T00:00:00Z","timestamp":1599436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T00:00:00Z","timestamp":1599436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Commit2Data","award":["628.001.001"],"award-info":[{"award-number":["628.001.001"]}]},{"DOI":"10.13039\/501100001834","name":"University of Twente","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001834","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion of a responsible Internet, which provides higher degrees of trust and sovereignty for critical service providers (e.g., power grids) and all kinds of other users by improving the transparency, accountability, and controllability of the Internet at the network-level. A responsible Internet accomplishes this through two new distributed and decentralized systems. The first is the Network Inspection Plane (NIP), which enables users to request measurement-based descriptions of the chains of network operators (e.g., ISPs and DNS and cloud providers) that handle their data flows or could potentially handle them, including the relationships between them and the properties of these operators. The second is the Network Control Plane (NCP), which allows users to specify how they expect the Internet infrastructure to handle their data (e.g., in terms of the security attributes that they expect chains of network operators to have) based on the insights they gained from the NIP. We discuss research directions and starting points to realize a responsible Internet by combining three currently largely disjoint research areas: large-scale measurements (for the NIP), open source-based programmable networks (for the NCP), and policy making (POL) based on the NIP and driving the NCP. We believe that a responsible Internet is the next stage in the evolution of the Internet and that the concept is useful for clean slate Internet systems as well.<\/jats:p>","DOI":"10.1007\/s10922-020-09564-7","type":"journal-article","created":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T11:17:25Z","timestamp":1600082245000},"page":"882-922","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["A Responsible Internet to Increase Trust in the Digital World"],"prefix":"10.1007","volume":"28","author":[{"given":"Cristian","family":"Hesselman","sequence":"first","affiliation":[]},{"given":"Paola","family":"Grosso","sequence":"additional","affiliation":[]},{"given":"Ralph","family":"Holz","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Kuipers","sequence":"additional","affiliation":[]},{"given":"Janet Hui","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Mattijs","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Joeri","family":"de Ruiter","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Sperotto","sequence":"additional","affiliation":[]},{"given":"Roland","family":"van Rijswijk-Deij","sequence":"additional","affiliation":[]},{"given":"Giovane C. M.","family":"Moura","sequence":"additional","affiliation":[]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[]},{"given":"Cees","family":"de Laat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,7]]},"reference":[{"key":"9564_CR1","unstructured":"GAIA-X: The European project kicks off the next phase. (2020). https:\/\/www.data-infrastructure.eu\/GAIAX\/Redaktion\/EN\/Publications\/gaia-x-the-european-project-kicks-of-the-next-phase.pdf?__blob=publicationFile&v=6"},{"key":"9564_CR2","unstructured":"European Digital Infrastructure and Data Sovereignty \u2013 A Policy Perspective. EIT Digital Report. 2020. https:\/\/www.eitdigital.eu\/newsroom\/news\/article\/new-report-on-european-digital-infrastructure-and-data-sovereignty\/"},{"key":"9564_CR3","unstructured":"Consultation paper: EU ICT Industrial Policy: Breaking the Cycle of Failure. ENISA, 2019. https:\/\/www.enisa.europa.eu\/publications\/enisa-position-papers-and-opinions\/eu-ict-industry-consultation-paper"},{"key":"9564_CR4","unstructured":"E.U. Recommends Limiting, but Not Banning, Huawei in 5G Rollout. New York Times, January 2020, https:\/\/www.nytimes.com\/2020\/01\/29\/world\/europe\/eu-huawei-5g.html. Accessed 18 June 2020"},{"key":"9564_CR5","unstructured":"Ceron, J.M., Chromik, J.J., Cardoso de Santanna, J.J., Pras, A.: Online discoverability and vulnerabilities of ICS\/SCADA devices in the Netherlands. In: Tech Report, University of Twente. 2019"},{"key":"9564_CR6","first-page":"25","volume":"1","author":"V Dignum","year":"2017","unstructured":"Dignum, V.: Responsible Artificial Intelligence: designing AI for human values. ITU J. 1, 25 (2017)","journal-title":"ITU J."},{"key":"9564_CR7","unstructured":"European Commission, Ethics Guidelines for Trustworthy AI, 2019, https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/ethics-guidelines-trustworthy-ai"},{"key":"9564_CR8","doi-asserted-by":"crossref","unstructured":"Rudin, C.: Stop Explaining Black Box Machine Learning Models for High Stakes Decisions and use Interpretable Models Instead. In: Nature Machine Intelligence. (2019)","DOI":"10.1038\/s42256-019-0048-x"},{"key":"9564_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67080-5","volume-title":"SCION: A Secure Internet Architecture","author":"A Perrig","year":"2017","unstructured":"Perrig, A., Szalachowski, P., Reischuk, R., Chuat, L.: SCION: A Secure Internet Architecture. Springer, Berlin (2017)"},{"key":"9564_CR10","doi-asserted-by":"crossref","unstructured":"Maffione, V., Salvestrini, F., Grasa, E., Bergesio, L., Tarzan, M.: A software development kit to exploit RINA programmability. In: 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016","DOI":"10.1109\/ICC.2016.7510711"},{"key":"9564_CR11","first-page":"3","volume":"63","author":"K O\u2019Hara","year":"2020","unstructured":"O\u2019Hara, K., Hall, W.: Four Internets: Considering the merits of several models and approaches to Internet governance\u201d. Commun. ACM 63, 3 (2020)","journal-title":"Commun. ACM"},{"key":"9564_CR12","unstructured":"Chromik, J. J.: Process-aware SCADA traffic monitoring: A local approach, Ph.D. thesis, University of Twente. 2019"},{"key":"9564_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1080\/23738871.2020.1740753","volume":"51","author":"J Arkko","year":"2020","unstructured":"Arkko, J.: The influence of internet architecture on centralised versus distributed internet services\u201d. J. Cyber Policy 51, 30\u201345 (2020). https:\/\/doi.org\/10.1080\/23738871.2020.1740753","journal-title":"J. Cyber Policy"},{"key":"9564_CR14","unstructured":"Mutually Agreed Norms for Routing Security. https:\/\/www.manrs.org\/. Accessed 20 May 2020"},{"key":"9564_CR15","unstructured":"Leverett, E., Clayton, R., Anderson, R.: Standardisation and Certification of the \u201cInternet of Things\u201d. In: 16th Annual Workshop on the Economics of Information Security (WEIS2017), USA. 2017"},{"key":"9564_CR16","doi-asserted-by":"crossref","unstructured":"Brown, I., Clark, D. D., Trossen, D.: Should specific values be embedded in the internet architecture?. In: ACM ReArch 2010, November 30, 2010, Philadelphia, USA","DOI":"10.1145\/1921233.1921246"},{"key":"9564_CR17","unstructured":"Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, J. A., Halderman, L., Invernizzi, M., Kallitsis, D., Kumar, C., Lever, Z., Ma, J., Mason, D., Menscher, C., Seaman, N., Sullivan, K., Zhou, Y.: Understanding the Mirai Botnet. In: 26th USENIX Security Symposium. 2017"},{"key":"9564_CR18","doi-asserted-by":"crossref","unstructured":"Moura, G. C. M., de O. Schmidt, R., Heidemann, J., de Vries, W. B., M\u00fcller, M., Wei, L., Hesselman, C. Anycast vs. ddos: Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. In: ACM Internet Measurement Conference (IMC 2016), 2016","DOI":"10.1145\/2987443.2987446"},{"key":"9564_CR19","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.future.2018.08.011","volume":"91","author":"R Koning","year":"2019","unstructured":"Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., Grosso, P.: Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. Fut. Gen. Comput. Syst. 91, 144\u2013156 (2019)","journal-title":"Fut. Gen. Comput. Syst."},{"key":"9564_CR20","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.future.2017.04.017","volume":"79","author":"R Koning","year":"2018","unstructured":"Koning, R., Buraglio, N., de Laat, C., Grosso, P.: CoreFlow: enriching Bro security events using network traffic monitoring data. Fut. Gen. Comput. Syst. 79, 235\u2013242 (2018)","journal-title":"Fut. Gen. Comput. Syst."},{"key":"9564_CR21","unstructured":"Ceron, J.: DDoS Clearing House. In: CENTR Jamboree 2020, 2020. https:\/\/www.sidnlabs.nl\/downloads\/5NMQ6vFghWvzFFnRikGaAS\/ead763585ff6b4de90a0839bac89dc92\/SIDN-labs-CENTR-ddos-talk-ceron.pdf"},{"key":"9564_CR22","unstructured":"Coming April 18: Control Your Zoom Data Routing. https:\/\/blog.zoom.us\/wordpress\/2020\/04\/13\/coming-april-18-control-your-zoom-data-routing\/. Accessed 9 May 2020"},{"key":"9564_CR23","unstructured":"Zoom security issues: Zoom buys security company, aims for end-to-end encryption (timeline of security issues in Zoom) https:\/\/www.cnet.com\/news\/zoom-security-issues-zoom-buys-security-company-aims-for-end-to-end-encryption\/. Accessed 14 May 2020"},{"key":"9564_CR24","unstructured":"Arkko, J.: Centralised Architectures in Internet Infrastructure. draft-arkko-arch-infrastructure-centralisation-00. (2019)"},{"key":"9564_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5325\/jinfopoli.9.2019.0001","volume":"9","author":"William Lehr","year":"2019","unstructured":"Lehr, William, Clark, David, Bauer, Steve, Berger, Arthur, Richter, Philipp: Whither the Public Internet? J. Inf. Policy 9, 1\u201342 (2019)","journal-title":"J. Inf. Policy"},{"key":"9564_CR26","doi-asserted-by":"crossref","unstructured":"Clark, D.: The Design Philosophy of the DARPA Internet Protocols. ACM SIGCOMM Computer Communication Review. 1995","DOI":"10.1145\/205447.205458"},{"key":"9564_CR27","unstructured":"Further extension of anycast network for .nl. 2019. https:\/\/www.sidnlabs.nl\/en\/news-and-blogs\/further-extension-of-anycast-network-for-nl. Accessed 14 Apr 2020"},{"key":"9564_CR28","doi-asserted-by":"crossref","unstructured":"Riftadi, M., Kuipers, F.A.: P4I\/O: Intent-Based Networking with P4. In: Proc. of the 2nd IEEE International Workshop on Emerging Trends in Softwarized Networks (ETSN 2019), June 28, 2019","DOI":"10.1109\/NETSOFT.2019.8806662"},{"key":"9564_CR29","unstructured":"van der Ham, J., Grosso, P., van der Pol, R., Toonk, A., de Laat, C.: Using the Network Description Language in Optical Networks. In: Tenth IFIP\/IEEE International Symposium on Integrated Management (IM 2007), 21-25 May 2007, Munich, Germany. May 21 2007, ISBN: 1-4244-0799-0, pp 199-205"},{"issue":"8","key":"9564_CR30","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1016\/j.compeleceng.2013.08.011","volume":"39","author":"M Ghijsen","year":"2013","unstructured":"Ghijsen, M., van der Ham, J., Grosso, P., Dumitru, C., Zhu, H., Zhao, Z., de Laat, C.: A semantic-web approach for modeling computing infrastructures. J. Comput. Elect. Eng. 39(8), 2553\u20132565 (2013)","journal-title":"J. Comput. Elect. Eng."},{"key":"9564_CR31","unstructured":"\u201cGIAI-X: Technical Architecture\u201d, June 2020, https:\/\/www.data-infrastructure.eu\/GAIAX\/Redaktion\/EN\/Publications\/gaia-x-technical-architecture.html"},{"issue":"7","key":"9564_CR32","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/JSAC.2016.2558918","volume":"34","author":"R van Rijswijk-Deij","year":"2016","unstructured":"van Rijswijk-Deij, R., Jonker, M., Sperotto, A., Pras, A.: A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE J. Sel. Areas Commun. 34(7), 1877\u20131888 (2016). https:\/\/doi.org\/10.1109\/JSAC.2016.2558918","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9564_CR33","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/INDIS.2018.00006","volume":"2018","author":"J Hill","year":"2018","unstructured":"Hill, J., Aloserij, M., Grosso, P.: Tracking Network Flows with P4, IEEE\/ACM Innovating the Network for Data-Intensive Science (INDIS). Dallas, TX, USA 2018, 23\u201332 (2018). https:\/\/doi.org\/10.1109\/INDIS.2018.00006","journal-title":"Dallas, TX, USA"},{"key":"9564_CR34","unstructured":"European Cybersecurity Industry Leaders Recommendations on Cybersecurity for Europe. 2016, http:\/\/ec.europa.eu\/newsroom\/dae\/document.cfm?action=display&doc_id=13326"},{"key":"9564_CR35","first-page":"1","volume":"47","author":"T B\u00f6ttger","year":"2017","unstructured":"B\u00f6ttger, T., Cuadrado, F., Uhlig, S.: Looking for Hypergiants in PeeringDB. ACM SIGCOMM Computer Commun. Rev. 47, 1 (2017)","journal-title":"ACM SIGCOMM Computer Commun. Rev."},{"key":"9564_CR36","volume-title":"A Knowledge Plane for the Internet, SIGCOMM\u201903, August 25\u201329","author":"D Clark","year":"2003","unstructured":"Clark, D., Partridge, C., Ramming, J.C., Wroclawski, J.T.: A Knowledge Plane for the Internet, SIGCOMM\u201903, August 25\u201329. Karlsruhe, Germany (2003)"},{"key":"9564_CR37","unstructured":"Czech Knot DNS added to .nl name servers. 2016. https:\/\/www.sidn.nl\/en\/news-and-blogs\/czech-knot-dns-added-to-nl-name-servers. Accessed 14 Apr 2020"},{"key":"9564_CR38","unstructured":"Google. Trillian. A transparent, highly scalable and cryptographically verifiable data store. https:\/\/github.com\/google\/trillian"},{"key":"9564_CR39","doi-asserted-by":"publisher","DOI":"10.3990\/1.9789036548687","volume-title":"DDoS Mitigation: A measurement-based approach","author":"M Jonker","year":"2019","unstructured":"Jonker, M.: DDoS Mitigation: A measurement-based approach. University of Twente, Enschede (2019). https:\/\/doi.org\/10.3990\/1.9789036548687"},{"issue":"5","key":"9564_CR40","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/3310165.3310175","volume":"48","author":"A Abhishta","year":"2019","unstructured":"Abhishta, A., van Rijswijk-Deij, R., Nieuwenhuis, L.J.M.: Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers. SIGCOMM Comput. Commun. Rev. 48(5), 70\u201376 (2019). https:\/\/doi.org\/10.1145\/3310165.3310175","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9564_CR41","unstructured":"Plot AS Count, CIDR website. https:\/\/www.cidr-report.org\/as2.0\/. Accessed 7 May 2020"},{"key":"9564_CR42","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/JSAC.2016.2558978","volume":"34","author":"J Schlamp","year":"2016","unstructured":"Schlamp, J., Holz, R., Jacquemart, Q., Carle, G., Biersack, E.W.: HEAP: reliable assessment of BGP hijacking attacks. IEEE J. Selected Areas Commun. 34, 6 (2016)","journal-title":"IEEE J. Selected Areas Commun."},{"key":"9564_CR43","doi-asserted-by":"crossref","unstructured":"Sommese, R., Moura, G., Jonker, M., van Rijswijk-Deij, R., Dainotti, A., Claffy, K., Sperotto, A.: When parents and children disagree: Diving into DNS delegation inconsistency. In: Passive and Active Measurement Conference (PAM) 2020","DOI":"10.1007\/978-3-030-44081-7_11"},{"key":"9564_CR44","first-page":"3","volume":"16","author":"B NunesAstuto","year":"2014","unstructured":"NunesAstuto, B., Mendonca, M., NamNguyen, X., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16, 3 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"9564_CR45","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2014)","journal-title":"Proc. IEEE"},{"key":"9564_CR46","unstructured":"Grosso, P., Hesselman, C., Hendriks, L., Hill, J., van der Pol, R., Reijs, V., van Rijswijk-Deij, R., de Ruiter, J., Schutijser, C., Steenman, H.: A national programmable infrastructure to experiment with next-generation networks. blog, 2020, https:\/\/www.2stic.nl\/national-programmable-infrastructure.html"},{"issue":"3","key":"9564_CR47","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bossharty","year":"2014","unstructured":"Bossharty, P., Daly, D., Gibby, G., Izzardy, M., McKeownz, N., Rexford, J., Schlesinger, C., Talaycoy, D., Vahdat, A., Varghesex, G., Walker, D.: P4: programming protocol-independent packet processors. ACM SIGCOMM Comput. Commun. Rev. 44(3), 87\u201395 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"9564_CR48","doi-asserted-by":"publisher","unstructured":"Knossen, S., Hill, J., Grosso, P.: Hop Recording and Forwarding State Logging: Two Implementations for Path Tracking in P4. In: IEEE\/ACM Innovating the Network for Data-Intensive Science (INDIS). Denver, CO, USA, pp 36\u201347 (2019). https:\/\/doi.org\/10.1109\/INDIS49552.2019.00010","DOI":"10.1109\/INDIS49552.2019.00010"},{"key":"9564_CR49","doi-asserted-by":"crossref","unstructured":"Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A., Tsudik, G.: Things, Trouble, Trust: On Building Trust in IoT Systems. In: Design Automation Conference (DAC). 2016","DOI":"10.1145\/2897937.2905020"},{"key":"9564_CR50","doi-asserted-by":"crossref","unstructured":"Koning, R., Polevoy, G., Meijer, L., de Laat, C., & Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 113\u2013123).","DOI":"10.1109\/CSCloud\/EdgeCom.2019.000-9"},{"issue":"5","key":"9564_CR51","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3390\/sym10050163","volume":"10","author":"L Ochoa-Aday","year":"2018","unstructured":"Ochoa-Aday, L., Cervell\u00f3-Pastor, C., Fern\u00e1ndez-Fern\u00e1ndez, A., Grosso, P.: An online algorithm for dynamic NFV placement in cloud-based autonomous response networks. Symmetry 10(5), 163 (2018)","journal-title":"Symmetry"},{"key":"9564_CR52","doi-asserted-by":"crossref","unstructured":"van Adrichem, N., Kuipers, F.A.: NDNFlow: Software-Defined Named Data Networking. In: Proc. of the 1st IEEE Conference on Network Softwarization (IEEE NetSoft 2015), London, UK, April 13-17 (2015)","DOI":"10.1109\/NETSOFT.2015.7116131"},{"key":"9564_CR53","doi-asserted-by":"crossref","unstructured":"McCauley, J., Harchol, Y., Panda, A., Raghavan, B., Shenker, S.: Enabling a permanent revolution in internet architecture. In: Proceedings of the ACM Special Interest Group on Data Communication (pp. 1-14) (2019).","DOI":"10.1145\/3341302.3342075"},{"key":"9564_CR54","unstructured":"Turkovic, B., Oostenbrink, J., Kuipers, F.A., Keslassy, I., Orda, A.: Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware. In: Proc. of IFIP Networking 2020, Paris, France, June 22-25, 2020"},{"key":"9564_CR55","doi-asserted-by":"crossref","unstructured":"Turkovic, B., Kuipers, F.A., van Adrichem, N., Langendoen, K.: Fast network congestion detection and avoidance using P4. In: Proc. of the ACM SIGCOMM 2018 Workshop on Networking for Emerging Applications and Technologies (NEAT 2018), Budapest, Hungary, August 20 (2018)","DOI":"10.1145\/3229574.3229581"},{"key":"9564_CR56","doi-asserted-by":"crossref","unstructured":"Polachan, K., Turkovic, B., Prabhakar, T.V., Singh, C., Kuipers, F.A.: Dynamic Network Slicing for the Tactile Internet. In: Proc. of the 11th ACM\/IEEE International Conference on Cyber-Physical Systems (ACM\/IEEE ICCPS 2020), Sydney, Australia, April 22-24, 2020","DOI":"10.1109\/ICCPS48487.2020.00020"},{"key":"9564_CR57","unstructured":"Riftadi, M., Oostenbrink, J., Kuipers, F.A.: GP4P4: Enabling Self-Programming Networks. arXiv:1910.00967"},{"key":"9564_CR58","doi-asserted-by":"crossref","unstructured":"Xue, J., Hui, Holz, R.: Applying smart contracts in online dispute resolutions on a large scale and its regulatory implications. In: Massimo, R., Giuseppe, D. (eds) Blockchain and Web 3.0 Social, Economic, and Technological Challenges, Routledge, London, 2019, pp. 177-191","DOI":"10.4324\/9780429029530-12"},{"key":"9564_CR59","unstructured":"E Silva, K.: Mitigating botnets: Regulatory solutions for industry intervention in large-scale cybercrime. Ph.D. thesis, Tilburg University, the Netherlands, 2019"},{"key":"9564_CR60","unstructured":"IAB Liaison Statement.: New IP, Shaping Future Network. 2020, https:\/\/datatracker.ietf.org\/liaison\/1677\/"},{"key":"9564_CR61","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2307\/1342583","volume":"116","author":"AM Froomkin","year":"2003","unstructured":"Froomkin, A.M.: Towards A Critical Theory of Cyberspace. Harvard Law Rev. 116, 3 (2003)","journal-title":"Harvard Law Rev."},{"key":"9564_CR62","volume-title":"Preventing regulatory capture: special interest influence and how to limit it","author":"D Carpenter","year":"2014","unstructured":"Carpenter, D., Moss, D.A.: Preventing regulatory capture: special interest influence and how to limit it. Cambridge University Press, Cambridge (2014)"},{"key":"9564_CR63","doi-asserted-by":"crossref","unstructured":"Wu, T.: The Curse of Bigness: Antitrust in the New Gilded Age, Columbia Global Reports. 2018","DOI":"10.2307\/j.ctv1fx4h9c"},{"key":"9564_CR64","unstructured":"UN, The age of digital interdependence Report of the UN Secretary-General\u2019s High-level Panel on Digital Cooperation. 2018, https:\/\/www.un.org\/en\/pdfs\/DigitalCooperation-report-for%20web.pdf"},{"key":"9564_CR65","unstructured":"European Commission, Horizon 2020 Work Programme 2018\u20132020 Information and Communication Technologies. 2020. https:\/\/ec.europa.eu\/research\/participants\/data\/ref\/h2020\/wp\/2018-2020\/main\/h2020-wp1820-leit-ict_en.pdf"},{"key":"9564_CR66","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195152661.001.0001","volume-title":"Who Controls the Internet? Illusions of a Borderless World","author":"J Goldsmith","year":"2006","unstructured":"Goldsmith, J., Wu, T.: Who Controls the Internet? Illusions of a Borderless World. Oxford University Press, Oxford (2006)"},{"key":"9564_CR67","volume-title":"Will the Internet Fragment? Sovereignty, Globalization and Cyberspace","author":"M Mueller","year":"2017","unstructured":"Mueller, M.: Will the Internet Fragment? Sovereignty, Globalization and Cyberspace. Polity Press, New York (2017)"},{"key":"9564_CR68","unstructured":"European Parliament, Digital Agenda for Europe, 2020, https:\/\/www.europarl.europa.eu\/factsheets\/en\/sheet\/64\/digital-agenda-for-europe"},{"key":"9564_CR69","unstructured":"Internet Governance Forum Berlin, Towards a Global Framework for Cyber Feace and Digital Cooperation: An Agenda for the 2020s, https:\/\/www.hans-bredow-institut.de\/uploads\/media\/default\/cms\/media\/05sk62i_Kleinwa%CC%88chter,%20Kettemann,%20Senges%20(eds.),%20Global%20Framework%20for%20Cyber%20Peace%20(2019).pdf, 25-29 November 2019"},{"key":"9564_CR70","unstructured":"Council of Europe, Strategy on Internet Governance (2016\u20132019) Final report. 2019, https:\/\/rm.coe.int\/168098fc7d"},{"key":"9564_CR71","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.future.2014.06.002","volume":"45","author":"L Gommans","year":"2015","unstructured":"Gommans, L., Vollbrecht, J., Gommans, B., de Laat, C.: The Service Provider Group Framework; A framework for arranging trust and power to facilitate authorization of network services. Fut. Gen. Computer Syst. 45, 176\u2013192 (2015)","journal-title":"Fut. Gen. Computer Syst."},{"key":"9564_CR72","doi-asserted-by":"crossref","unstructured":"Ammar, M.: Ex uno pluria: The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. In: ACM SIGCOMM Computer Communication Review, Vol. 48, Issue 1, January 2018. https:\/\/ccronline.sigcomm.org\/2018\/ccr-january-2018\/ex-uno-pluria-the-service-infrastructure-cycle-ossification-and-the-fragmentation-of-the-internet\/.","DOI":"10.1145\/3211852.3211861"},{"key":"9564_CR73","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1016\/j.comnet.2009.10.017","volume":"545","author":"NM Chowdhury","year":"2010","unstructured":"Chowdhury, N.M., Mosharaf, K., Raouf, B.: A survey of network virtualization. Computer Netw. 545, 862\u2013876 (2010)","journal-title":"Computer Netw."},{"key":"9564_CR74","doi-asserted-by":"crossref","unstructured":"Lehr, W., Kenneally, E., Bauer, S.: The Road to an Open Internet is Paved with Pragmatic Disclosure & Transparency Policies. In: TPRC 43: The 43rd Research Conference on Communication, Information and Internet Policy. 2015","DOI":"10.2139\/ssrn.2587718"},{"key":"9564_CR75","doi-asserted-by":"crossref","unstructured":"Pappas, C., Argyraki, K., Bechtold, S., Perrig, A.:Transparency Instead of Neutrality. In: HotNets\u201915, November 16\u201317 2015, Philadelphia, PA, USA","DOI":"10.1145\/2834050.2834082"},{"key":"9564_CR76","doi-asserted-by":"publisher","first-page":"88","DOI":"10.2478\/popets-2019-0021","volume":"2","author":"G Fragkouli","year":"2019","unstructured":"Fragkouli, G., Argyraki, K., Ford, B.: MorphIT: morphing packet reports for internet transparency. Proc. Privacy Enhancing Technol. 2, 88\u2013104 (2019)","journal-title":"Proc. Privacy Enhancing Technol."},{"key":"9564_CR77","first-page":"6","volume":"50","author":"OP Waldhorst","year":"2010","unstructured":"Waldhorst, O.P., Blankenhorn, C., Haage, D., Holz, R., Koch, G.G., Koldehofe, B., Lampi, F., Mayer, C.P., Mies, S.: Spontaneous virtual networks: on the road towards the internet\u2019s next generation. Inform. Technol. 50, 6 (2010)","journal-title":"Inform. Technol."},{"key":"9564_CR78","doi-asserted-by":"crossref","unstructured":"Haage, D., Holz, R., Niedermayer, H., Laskov, P.: CLIO\u2014a cross-layer information service for overlay network optimization. In: Proc. Kommunikation in Verteilten Systemen (KiVS), 2009","DOI":"10.1007\/978-3-540-92666-5_24"},{"key":"9564_CR79","unstructured":"Claffy, K., Voelker, G.: OKN-KISMET Project Proposal. 2019. https:\/\/www.caida.org\/funding\/okn-kismet\/okn-kismet_proposal.xml"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-020-09564-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-020-09564-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-020-09564-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T23:13:39Z","timestamp":1630970019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-020-09564-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,7]]},"references-count":79,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["9564"],"URL":"https:\/\/doi.org\/10.1007\/s10922-020-09564-7","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,7]]},"assertion":[{"value":"20 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}