{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:46Z","timestamp":1772164006376,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,17]],"date-time":"2008-08-17T00:00:00Z","timestamp":1218931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,17]]},"DOI":"10.1145\/1402958.1402972","type":"proceedings-article","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T08:38:39Z","timestamp":1219135119000},"page":"111-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Shadow configuration as a network management primitive"],"prefix":"10.1145","author":[{"given":"Richard","family":"Alimi","sequence":"first","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"Y. Richard","family":"Yang","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162638.1162639"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of ALS","author":"Anderson P.","year":"2000"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282404"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159916"},{"key":"e_1_3_2_1_5_1","volume-title":"HotDep","author":"Caesar M.","year":"2005"},{"key":"e_1_3_2_1_6_1","unstructured":"CAIDA\n\n  \n  : Cooporative association for Internet data analysis. http:\/\/www.caida.org\/.  CAIDA: Cooporative association for Internet data analysis. http:\/\/www.caida.org\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321753.1321757"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of IEEE INFOCOM '04","author":"B.-Y.","year":"2004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco Systems. Common routing problem with OSPF forwarding address. http:\/\/www.cisco.com\/warp\/public\/104\/10.pdf.  Cisco Systems. Common routing problem with OSPF forwarding address. http:\/\/www.cisco.com\/warp\/public\/104\/10.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"Cisco Systems. Network solutions integrated test environment: Delivering on the promise of innovation. URL: http:\/\/www.cisco.com\/application\/pdf\/en\/us\/guest\/netsol\/ns522\/c2072\/cdccont_0900aecd80458f98.pdf 2006.  Cisco Systems. Network solutions integrated test environment: Delivering on the promise of innovation. URL: http:\/\/www.cisco.com\/application\/pdf\/en\/us\/guest\/netsol\/ns522\/c2072\/cdccont_0900aecd80458f98.pdf 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(00)00030-4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364677"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX","author":"Enck W.","year":"2007"},{"key":"e_1_3_2_1_15_1","volume-title":"NSDI","author":"Feamster N.","year":"2005"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198265"},{"key":"e_1_3_2_1_17_1","unstructured":"A. Feldmann. Netdb: IP network configuration debugger\/database. Technical report AT&T Research July 1999.  A. Feldmann. Netdb: IP network configuration debugger\/database. Technical report AT&T Research July 1999."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.953233"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039866"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497895"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.19"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.25"},{"key":"e_1_3_2_1_23_1","volume-title":"NSDI","author":"Handley M.","year":"2005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637217"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298321"},{"key":"e_1_3_2_1_27_1","unstructured":"Juniper Networks. Intelligent logical router service. URL: http:\/\/www.juniper.net\/solutions\/literature\/white_papers\/200097.pdf Oct. 2004.  Juniper Networks. Intelligent logical router service. URL: http:\/\/www.juniper.net\/solutions\/literature\/white_papers\/200097.pdf Oct. 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_1_29_1","unstructured":"Z. Kerravala. As the value of enterprise networks escalates so does the need for configuration management Jan. 2004.  Z. Kerravala. As the value of enterprise networks escalates so does the need for configuration management Jan. 2004."},{"key":"e_1_3_2_1_30_1","volume-title":"The Yankee Group","author":"Kerravale Z.","year":"2002"},{"key":"e_1_3_2_1_31_1","volume-title":"IEEE INFOCOM","author":"Kiciman E.","year":"2007"},{"key":"e_1_3_2_1_32_1","volume-title":"NSDI","author":"Kompella R. R.","year":"2005"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.252"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282408"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945456"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015472"},{"key":"e_1_3_2_1_37_1","first-page":"155","volume-title":"Proceedings of LISA","author":"Narain S.","year":"2005"},{"key":"e_1_3_2_1_38_1","unstructured":"S. Narain. Overview of configuration validation. Presentation at LISA 2006 Configuration Workshop Dec. 2006.  S. Narain. Overview of configuration validation. Presentation at LISA 2006 Configuration Workshop Dec. 2006."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893878"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX USITS","author":"Oppenheimer D.","year":"2003"},{"key":"e_1_3_2_1_41_1","unstructured":"Quagga Software Routing Suite. http:\/\/www.quagga.net\/.  Quagga Software Routing Suite. http:\/\/www.quagga.net\/."},{"key":"e_1_3_2_1_42_1","volume-title":"QoFIS'02 LNCS","author":"Quoitin B.","year":"2002"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005745"},{"key":"e_1_3_2_1_44_1","unstructured":"University of Oregon Route Views Project. http:\/\/www.routeviews.org\/.  University of Oregon Route Views Project. http:\/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251117"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.01.010"},{"key":"e_1_3_2_1_47_1","unstructured":"L. Tatman. Incorporating routing analysis into IP network management. URL: http:\/\/www.agilent.com\/labs\/features\/2003_wp_roca.pdf May 2003.  L. Tatman. Incorporating routing analysis into IP network management. URL: http:\/\/www.agilent.com\/labs\/features\/2003_wp_roca.pdf May 2003."},{"key":"e_1_3_2_1_48_1","unstructured":"VideoLAN - VLC media player. http:\/\/www.videolan.org\/.  VideoLAN - VLC media player. http:\/\/www.videolan.org\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159956"},{"key":"e_1_3_2_1_50_1","volume-title":"Rexford. VROOM: Virtual ROuters On the Move. In HotNets-VI","author":"Wang Y.","year":"2007"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2002.1019229"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/318773.318946"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177091"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/11499169_18"}],"event":{"name":"SIGCOMM '08: ACM SIGCOMM 2008 Conference","location":"Seattle WA USA","acronym":"SIGCOMM '08","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the ACM SIGCOMM 2008 conference on Data communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1402958.1402972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1402958.1402972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:47:19Z","timestamp":1750243639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1402958.1402972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,17]]},"references-count":56,"alternative-id":["10.1145\/1402958.1402972","10.1145\/1402958"],"URL":"https:\/\/doi.org\/10.1145\/1402958.1402972","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1402946.1402972","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,8,17]]},"assertion":[{"value":"2008-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}