{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:51:02Z","timestamp":1730285462275,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/nfv-sdn.2016.7919476","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T21:04:03Z","timestamp":1494623043000},"page":"56-61","source":"Crossref","is-referenced-by-count":5,"title":["Security policy transition framework for Software Defined networks"],"prefix":"10.1109","author":[{"given":"Jacob H.","family":"Cox","sequence":"first","affiliation":[]},{"given":"Russell J.","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Henry L.","family":"Owen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Toward network access control with software-defined networking","year":"2013","author":"gamayunov","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.39"},{"journal-title":"POX","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795471"},{"journal-title":"Ryu","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795471"},{"key":"ref3","first-page":"128","article-title":"Modular SDN Programming With Pyretic","volume":"38","author":"reich","year":"2013","journal-title":"Communications Magazine IEEE"},{"key":"ref6","first-page":"59","article-title":"Kinetic: Verifiable Dynamic Network Control","author":"kim","year":"2015","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068863"},{"key":"ref8","article-title":"IEEE 802.1 X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines","author":"congdon","year":"2003","journal-title":"RFC3580"},{"journal-title":"Network Management System Best Practices White Paper","year":"2007","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref1","first-page":"30","article-title":"Software-Defined Networking","volume":"17","author":"mckeown","year":"2009","journal-title":"INFOCOM Keynote Talk"},{"journal-title":"SNAC","year":"0","key":"ref9"}],"event":{"name":"2016 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN)","start":{"date-parts":[[2016,11,7]]},"location":"Palo Alto, CA","end":{"date-parts":[[2016,11,10]]}},"container-title":["2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7893447\/7919460\/07919476.pdf?arnumber=7919476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T22:22:03Z","timestamp":1580768523000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7919476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn.2016.7919476","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}