{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:06:54Z","timestamp":1766732814107,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icccn.2018.8487415","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T22:24:08Z","timestamp":1539296648000},"page":"1-9","source":"Crossref","is-referenced-by-count":16,"title":["Transaction-Based Flow Rule Conflict Detection and Resolution in SDN"],"prefix":"10.1109","author":[{"given":"Jie","family":"Cui","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kewei","family":"Sha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Advances in Cryptology Proceedings of CRYPTO &#x2018;84 Santa Barbara California USA"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/11593447_28","article-title":"Ef-ficient and provably-secure identity-based signatures and signcryption from bilinear maps","author":"barreto","year":"2005","journal-title":"Advances in Cryptology - ASIACRYPT 2005"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1868447.1868466"},{"year":"1995","author":"beizer","journal-title":"Black-Box Testing Techniques for Functional Testing of Software and Systems","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICC.2013.6654813"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1384609.1384625"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/2660267.2660353","article-title":"Rosemary: A robust, secure, and highperformance network operating system","author":"shin","year":"2014","journal-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ser CCS &#x2018;14"},{"key":"ref17","article-title":"Fresco: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"proceedings of Network and Distributed Security Symposium"},{"key":"ref18","first-page":"365","article-title":"Can the production network be the testbed?","author":"sherwood","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation ser OSDI&#x2019; 10"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1866898.1866905"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1355734.1355746"},{"key":"ref3","article-title":"Sane: A protection architecture for enterprise networks","author":"casado","year":"2006","journal-title":"Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 ser USENIX-SS&#x2018;06"},{"key":"ref6","first-page":"969","volume":"27","author":"wang","year":"2016","journal-title":"Software defined networking security model threats and mechanism"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/COMST.2015.2474118"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.14722\/ndss.2015.23222"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2342441.2342466"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1282380.1282382"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/COMST.2014.2330903"},{"year":"2012","author":"pfaff","article-title":"Openflow switch specification 1.3.0","key":"ref9"}],"event":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2018,7,30]]},"location":"Hangzhou","end":{"date-parts":[[2018,8,2]]}},"container-title":["2018 27th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8486798\/8487301\/08487415.pdf?arnumber=8487415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:46:57Z","timestamp":1643219217000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8487415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icccn.2018.8487415","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}