{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:43:40Z","timestamp":1778345020213,"version":"3.51.4"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tnsm.2021.3130290","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T15:30:10Z","timestamp":1637767810000},"page":"1729-1745","source":"Crossref","is-referenced-by-count":14,"title":["Continuous Verification of Network Security Compliance"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9089-6968","authenticated-orcid":false,"given":"Claas","family":"Lorenz","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Potsdam, Potsdam, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9917-4443","authenticated-orcid":false,"given":"Vera","family":"Clemens","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Potsdam, Potsdam, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Max","family":"Schrotter","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Potsdam, Potsdam, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bettina","family":"Schnor","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Potsdam, Potsdam, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Fast configuration change impact analysis for network overlay data center networks","author":"you","year":"2021","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2868050"},{"key":"ref32","first-page":"735","article-title":"Delta-Net: Real-time network verification using atoms","author":"horn","year":"2017","journal-title":"Proc NSDI"},{"key":"ref31","first-page":"499","article-title":"Checking beliefs in dynamic networks","author":"lopes","year":"2015","journal-title":"Proc NSDI"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342094"},{"key":"ref37","first-page":"201","article-title":"Tiramisu: Fast multilayer network verification","author":"abhashkumar","year":"2020","journal-title":"Proc NSDI"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref35","first-page":"469","article-title":"A general approach to network configuration analysis","author":"fogel","year":"2015","journal-title":"Proc NSDI"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"ref10","author":"bakke","year":"2020","journal-title":"fwbuilder"},{"key":"ref40","article-title":"Role based access control","year":"2004"},{"key":"ref11","first-page":"2605","article-title":"Discovery of policy anomalies in distributed firewalls","author":"al-shaer","year":"2016","journal-title":"Proc INFOCOM"},{"key":"ref12","first-page":"199","article-title":"FIREMAN: A toolkit for FIREwall modeling and analysis","author":"yuan","year":"2006","journal-title":"Proc s of the IEEE"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.44"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.32"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14977-6_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-200017"},{"key":"ref17","first-page":"699","article-title":"Verifying reachability in networks with mutable datapaths","author":"panda","year":"2017","journal-title":"Proc NSDI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2720172"},{"key":"ref19","first-page":"181","article-title":"NetSMC: A custom symbolic model checker for stateful network verification","author":"yuan","year":"2020","journal-title":"Proc NSDI"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2723725"},{"key":"ref4","first-page":"99","article-title":"Real time network policy checking using header space analysis","author":"kazemian","year":"2013","journal-title":"Proc NSDI"},{"key":"ref27","first-page":"241","article-title":"APKeep: Realtime verification for real networks","author":"zhang","year":"2020","journal-title":"Proc NSDI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00241"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"},{"key":"ref29","first-page":"87","article-title":"Libra: Divide and conquer to verify forwarding tables in huge networks","author":"zeng","year":"2014","journal-title":"Proc NSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2017.7903956"},{"key":"ref8","article-title":"ForestFirewalls: Getting firewall configuration right in critical networks","author":"ranathunga","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1012.0365"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497196"},{"key":"ref9","year":"2018","journal-title":"SD-Access Segmentation Design Guide"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5220\/0005517402100219"},{"key":"ref46","author":"kazemian","year":"2012","journal-title":"Hassel"},{"key":"ref20","first-page":"257","article-title":"Liveness verification of stateful network functions","author":"yousefi","year":"2020","journal-title":"Proc NSDI"},{"key":"ref45","year":"2019","journal-title":"Manual Page for Iptables-Extensions"},{"key":"ref22","first-page":"699","article-title":"Alembic: Automated model inference for stateful network functions","author":"moon","year":"2019","journal-title":"Proc NSDI"},{"key":"ref47","author":"davies","year":"4890","journal-title":"Recommendations for Filtering ICMPv6 Messages in Firewalls"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3045781"},{"key":"ref42","year":"2020","journal-title":"Puppet"},{"key":"ref24","first-page":"113","article-title":"Header space analysis: Static checking for networks","author":"kazemian","year":"2012","journal-title":"Proc NSDI"},{"key":"ref41","year":"2020","journal-title":"Ansible"},{"key":"ref23","first-page":"683","article-title":"Dataplane equivalence and its applications","author":"dumitrescu","year":"2019","journal-title":"Proc NSDI"},{"key":"ref44","author":"diekmann","year":"2016","journal-title":"Networks and Netwars"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"},{"key":"ref43","year":"0","journal-title":"IPTABLES Manual Page"},{"key":"ref25","first-page":"15","article-title":"VeriFlow: Verifying network-wide invariants in real time","author":"khurshid","year":"2013","journal-title":"Proc NSDI"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9792219\/09626142.pdf?arnumber=9626142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:32:45Z","timestamp":1656347565000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9626142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":47,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3130290","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.15029811","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.15029811.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.15029811.v2","asserted-by":"object"}]},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}