{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:06Z","timestamp":1773511146962,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Guangdong Province Key Area Research and Development Program","award":["2019B010137002"],"award-info":[{"award-number":["2019B010137002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tdsc.2024.3413752","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T18:05:55Z","timestamp":1718301955000},"page":"677-694","source":"Crossref","is-referenced-by-count":2,"title":["IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5169-6536","authenticated-orcid":false,"given":"Zixuan","family":"Ma","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4307-0896","authenticated-orcid":false,"given":"Chen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6830-7462","authenticated-orcid":false,"given":"Yuqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9077-0687","authenticated-orcid":false,"given":"Ruibang","family":"You","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0278-7420","authenticated-orcid":false,"given":"Bibo","family":"Tu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Build security into your network\u2019s DNA: The zero trust network architecture","author":"Kindervag","year":"2010"},{"key":"ref2","article-title":"Zero trust explained: The ultimate guide to zero trust security","author":"Turner","year":"2024"},{"key":"ref3","article-title":"Zero trust architecture"},{"key":"ref4","article-title":"Documentation for the ISOT cloud intrusion detection dataset","author":"Aldribi","year":"2020"},{"key":"ref5","first-page":"797","article-title":"PrivateEye: Scalable and privacy-preserving compromise detection in the cloud","volume-title":"Proc. 17th USENIX Symp. Netw. Syst. Des. Implementation","author":"Arzani"},{"key":"ref6","article-title":"ONOS intent framework"},{"key":"ref7","article-title":"NIC architecture","author":"Rodrigues","year":"2018"},{"key":"ref8","article-title":"Nemo","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref10","article-title":"Neutron security groups","year":"2014"},{"key":"ref11","article-title":"Group based policy","author":"Naiksatam"},{"key":"ref12","article-title":"Network policies","year":"2024"},{"key":"ref13","article-title":"Illumio core design guide","year":"2023"},{"key":"ref14","article-title":"Cilium network policy","year":"2024"},{"key":"ref15","article-title":"Calico network policy"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314349"},{"key":"ref17","volume-title":"Computer Security: Art and Science","author":"Bishop","year":"2002"},{"key":"ref18","article-title":"CISO perspectives and progress in deploying zero trust"},{"key":"ref19","article-title":"Innovation insight: Intent-based networking systems","year":"2017"},{"key":"ref20","article-title":"Amazon VPC","year":"2024"},{"key":"ref21","article-title":"Indicators associated with WannaCry Ransomware","year":"2018"},{"key":"ref22","first-page":"113","article-title":"Header space analysis: Static checking for networks","volume-title":"Proc. 9th USENIX Symp. Netw. Syst. Des. Implementation","author":"Kazemian"},{"key":"ref23","article-title":"OpenStack wiki"},{"key":"ref24","article-title":"Production-grade container orchestration kubernetes","year":"2024"},{"key":"ref25","article-title":"Information technology \u2013 syntactic metalanguage \u2013 extended BNF","year":"1996"},{"key":"ref26","article-title":"ONOS wiki","year":"2020"},{"key":"ref27","article-title":"ONOS SONA","year":"2018"},{"key":"ref28","article-title":"Neo4j","year":"2024"},{"key":"ref29","article-title":"Open vSwitch","year":"2016"},{"key":"ref30","article-title":"Mininet","year":"2022"},{"key":"ref31","first-page":"3971","article-title":"Automatic policy generation for inter-service access control of microservices","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Li"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00029"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393608"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363191"},{"key":"ref36","article-title":"Neuvector","year":"2024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"ref38","first-page":"1","article-title":"Composing software defined networks","volume-title":"Proc. 10th USENIX Symp. Netw. Syst. Des. Implementation","author":"Monsanto"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787506"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2974727"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10843954\/10557157.pdf?arnumber=10557157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T03:57:42Z","timestamp":1737431862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10557157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3413752","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}