{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:20:45Z","timestamp":1725697245767},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/icnp.2016.7784424","type":"proceedings-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T07:55:26Z","timestamp":1481961326000},"page":"1-10","source":"Crossref","is-referenced-by-count":14,"title":["Bringing execution assurances of pattern matching in outsourced middleboxes"],"prefix":"10.1109","author":[{"given":"Xingliang","family":"Yuan","sequence":"first","affiliation":[]},{"family":"Huayi Duan","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"DFC: Accelerating string pattern matching for network applications","author":"choi","year":"2016","journal-title":"Proc of USENIX NSDI"},{"key":"ref11","article-title":"Uncheatable grid computing","author":"du","year":"2010","journal-title":"Algorithms and theory of computation handbook Chapman & Hall\/CRC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14778\/2752939.2752944"},{"key":"ref15","article-title":"Don't call them middle-boxes, call them middlepipes","author":"jamjoom","year":"2014","journal-title":"Proc of ACM HotSDN"},{"key":"ref16","article-title":"Flow-fall: A service chaining architecture with commodity technologies","author":"nakamura","year":"2015","journal-title":"Proc of IEEE ICNP"},{"key":"ref17","article-title":"Uncheatable distributed computations","author":"golle","year":"2001","journal-title":"proc of CT-RSA"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref19","article-title":"Query execution assurance for outsourced databases","author":"sion","year":"2005","journal-title":"Proc of VLDB"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524526"},{"journal-title":"AWS WAF - Web Application Firewall","year":"0","key":"ref4"},{"key":"ref27","article-title":"Mbark: Securely outsourcing middleboxes to the cloud","author":"lan","year":"2016","journal-title":"Proc of USENIX NSDI"},{"key":"ref3","article-title":"Clickos and the art of network function virtualization","author":"martins","year":"2014","journal-title":"Proc of USENIX NSDI"},{"journal-title":"ONOS and AT&T team Up to deliver CORD","year":"0","author":"moriarty-siler","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"journal-title":"Software network virtualization overlay","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940151"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535831"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504737"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836095"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813711"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199338"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1592648.1592654"}],"event":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2016,11,8]]},"location":"Singapore","end":{"date-parts":[[2016,11,11]]}},"container-title":["2016 IEEE 24th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7774710\/7784399\/07784424.pdf?arnumber=7784424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:07:21Z","timestamp":1507000041000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7784424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icnp.2016.7784424","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}