{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:41Z","timestamp":1772163941910,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,30]],"date-time":"2004-08-30T00:00:00Z","timestamp":1093824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,30]]},"DOI":"10.1145\/1015467.1015472","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"27-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Routing design in operational networks"],"prefix":"10.1145","author":[{"given":"David A.","family":"Maltz","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Geoffrey","family":"Xie","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Jibin","family":"Zhan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"G\u00edsli","family":"Hj\u00e1lmt\u00fdsson","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs--Research"}]},{"given":"Albert","family":"Greenberg","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs--Research"}]}],"member":"320","published-online":{"date-parts":[[2004,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"RFC 3174 - US Secure Hash Algorithm 1 (SHA1)","author":"Jones D. Eastlake","year":"2001","unstructured":"D. Eastlake 3rd and P. Jones . RFC 3174 - US Secure Hash Algorithm 1 (SHA1) , 2001 . Available from http:\/\/www.ietf.org\/rfcs\/rfc3174.html.]] D. Eastlake 3rd and P. Jones. RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. Available from http:\/\/www.ietf.org\/rfcs\/rfc3174.html.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.caida.org\/tools\/measurement\/skitter\/","author":"CAIDA.","year":"2000","unstructured":"CAIDA. http:\/\/www.caida.org\/tools\/measurement\/skitter\/ , 2000 .]] CAIDA. http:\/\/www.caida.org\/tools\/measurement\/skitter\/, 2000.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Second Workshop on Hot Topics in Networks (HotNets-II)","author":"Caldwell Don","year":"2003","unstructured":"Don Caldwell , Anna Gilbert , Joel Gottlieb , Albert Greenberg , Gisli Hjalmtysson , and Jennifer Rexford . The cutting EDGE of IP router configuration . In Second Workshop on Hot Topics in Networks (HotNets-II) , November 2003 .]] Don Caldwell, Anna Gilbert, Joel Gottlieb, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. The cutting EDGE of IP router configuration. In Second Workshop on Hot Topics in Networks (HotNets-II), November 2003.]]"},{"key":"e_1_3_2_1_4_1","volume-title":"RFC 1195 - Use of OSI IS-IS for routing in TCP\/IP and dual environments","author":"Callon R.","year":"1990","unstructured":"R. Callon . RFC 1195 - Use of OSI IS-IS for routing in TCP\/IP and dual environments , 1990 .]] R. Callon. RFC 1195 - Use of OSI IS-IS for routing in TCP\/IP and dual environments, 1990.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.826367"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2267"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Global Internet 2002","author":"Gao Lixin","year":"2002","unstructured":"Lixin Gao and Feng Wang . The extent of AS path inflation by routing policies . In Proceedings of Global Internet 2002 , 2002 .]] Lixin Gao and Feng Wang. The extent of AS path inflation by routing policies. In Proceedings of Global Internet 2002, 2002.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/850936.852486"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316231"},{"key":"e_1_3_2_1_11_1","unstructured":"DMTF Networks~Working Group. http:\/\/www.dmtf.org\/standards\/cim\/cim_schema_v27.]]  DMTF Networks~Working Group. http:\/\/www.dmtf.org\/standards\/cim\/cim_schema_v27.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Internet Routing Architectures","author":"Halabi Sam","year":"2001","unstructured":"Sam Halabi and Danny McPherson . Internet Routing Architectures . Cisco Press , 2001 .]] Sam Halabi and Danny McPherson. Internet Routing Architectures. Cisco Press, 2001.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"RFC 1058 - Routing Information Protocol","author":"Hedrick C.","year":"1988","unstructured":"C. Hedrick . RFC 1058 - Routing Information Protocol , 1988 .]] C. Hedrick. RFC 1058 - Routing Information Protocol, 1988.]]"},{"key":"e_1_3_2_1_14_1","unstructured":"OPNET~Technologies Inc. http:\/\/www.mil3.com\/products\/home.html.]]  OPNET~Technologies Inc. http:\/\/www.mil3.com\/products\/home.html.]]"},{"key":"e_1_3_2_1_15_1","unstructured":"Packet~Design Inc. http:\/\/www.packetdesign.com.]]  Packet~Design Inc. http:\/\/www.packetdesign.com.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380010203"},{"key":"e_1_3_2_1_18_1","unstructured":"David Meyer and University of~Oregon Route Views~Project. http:\/\/antc.uoregon.edu\/route-views\/.]]  David Meyer and University of~Oregon Route Views~Project. http:\/\/antc.uoregon.edu\/route-views\/.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"tcpdpriv - remove private information from a tcpdump -w file. Software distribution available from http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html","author":"Minshall Greg","year":"1997","unstructured":"Greg Minshall . tcpdpriv - remove private information from a tcpdump -w file. Software distribution available from http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html , 1997 .]] Greg Minshall. tcpdpriv - remove private information from a tcpdump -w file. Software distribution available from http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html, 1997.]]"},{"key":"e_1_3_2_1_20_1","first-page":"2","author":"Moy J.","year":"1997","unstructured":"J. Moy . RFC 2178 - OSPF Version 2 , 1997 .]] J. Moy. RFC 2178 - OSPF Version 2, 1997.]]","journal-title":"OSPF Version"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"key":"e_1_3_2_1_22_1","volume-title":"RFC 1771 - A Border Gateway Protocol 4 (BGP-4)","author":"Rekhter Y.","year":"1995","unstructured":"Y. Rekhter and T. Li . RFC 1771 - A Border Gateway Protocol 4 (BGP-4) , 1995 .]] Y. Rekhter and T. Li. RFC 1771 - A Border Gateway Protocol 4 (BGP-4), 1995.]]"},{"key":"e_1_3_2_1_23_1","unstructured":"ITU-T M series recommendations. http:\/\/www.itu.int\/rec\/recommendation.asp-?type=products&lang=e&parent=T-REC-M.]]  ITU-T M series recommendations. http:\/\/www.itu.int\/rec\/recommendation.asp-?type=products&lang=e&parent=T-REC-M.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347426"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633039"},{"key":"e_1_3_2_1_26_1","unstructured":"Cisco Systems. Enhanced IGRP. http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/cisintwk\/ito_doc\/en_igrp.htm.]]  Cisco Systems. Enhanced IGRP. http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/cisintwk\/ito_doc\/en_igrp.htm.]]"},{"key":"e_1_3_2_1_28_1","unstructured":"Tatu Ylonen. Thoughts on how to mount an attack on tcpdpriv's \"-a50\" option... Web White Paper available from http:\/\/ita.ee.lbl.gov\/html\/contrib\/attack50\/attack50.html.]]  Tatu Ylonen. Thoughts on how to mount an attack on tcpdpriv's \"-a50\" option... Web White Paper available from http:\/\/ita.ee.lbl.gov\/html\/contrib\/attack50\/attack50.html.]]"}],"event":{"name":"SIGCOMM04: ACM SIGCOMM 2004 Conference","location":"Portland Oregon USA","acronym":"SIGCOMM04","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1015467.1015472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:23:45Z","timestamp":1750253025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015472"}},"subtitle":["a look from the inside"],"short-title":[],"issued":{"date-parts":[[2004,8,30]]},"references-count":26,"alternative-id":["10.1145\/1015467.1015472","10.1145\/1015467"],"URL":"https:\/\/doi.org\/10.1145\/1015467.1015472","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1030194.1015472","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,8,30]]},"assertion":[{"value":"2004-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}