{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:27Z","timestamp":1750307067418,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T00:00:00Z","timestamp":1344816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,13]]},"DOI":"10.1145\/2342356.2342434","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"383-394","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Private and verifiable interdomain routing decisions"],"prefix":"10.1145","author":[{"given":"Mingchen","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Wenchao","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Alexander J.T.","family":"Gurney","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, DC, USA"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,8,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AS relationships dataset from CAIDA. http:\/\/www.caida.org\/data\/active\/as-relationships\/.  AS relationships dataset from CAIDA. http:\/\/www.caida.org\/data\/active\/as-relationships\/."},{"key":"e_1_3_2_2_2_1","volume-title":"Common utilizations of the BGP community attribute. Internet draft","author":"Bonaventure O.","year":"2003","unstructured":"O. Bonaventure and B. Quoitin . Common utilizations of the BGP community attribute. Internet draft , 2003 . O. Bonaventure and B. Quoitin. Common utilizations of the BGP community attribute. Internet draft, 2003."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1998"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355743"},{"key":"e_1_3_2_2_6_1","volume-title":"Proc. 35th Annual Telecomm. Policy Research Conf. (TPRC)","author":"Faratin P.","year":"2007","unstructured":"P. Faratin , D. Clark , P. Gilmore , S. Bauer , A. Berger , and W. Lehr . Complexity of Internet interconnections: Technology, incentives and implications for policy . In Proc. 35th Annual Telecomm. Policy Research Conf. (TPRC) , Sept. 2007 . P. Faratin, D. Clark, P. Gilmore, S. Bauer, A. Berger, and W. Lehr. Complexity of Internet interconnections: Technology, incentives and implications for policy. In Proc. 35th Annual Telecomm. Policy Research Conf. (TPRC), Sept. 2007."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028815"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.368958"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402989"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070577"},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. NSDI","author":"Haeberlen A.","year":"2009","unstructured":"A. Haeberlen , I. Avramopoulos , J. Rexford , and P. Druschel . NetReview: Detecting when interdomain routing goes wrong . In Proc. NSDI , Apr 2009 . A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. NetReview: Detecting when interdomain routing goes wrong. In Proc. NSDI, Apr 2009."},{"key":"e_1_3_2_2_15_1","unstructured":"IETF Working Group on Secure Inter-domain Routing. http:\/\/tools.ietf.org\/wg\/sidr.  IETF Working Group on Secure Inter-domain Routing. http:\/\/tools.ietf.org\/wg\/sidr."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833581"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_2_18_1","unstructured":"W. Kumari and S. Kotikalapudi. Recommendation for not using AS\\_SET and AS\\_CONFED\\_SET in BGP. RFC 6472.  W. Kumari and S. Kotikalapudi. Recommendation for not using AS\\_SET and AS\\_CONFED\\_SET in BGP. RFC 6472."},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. NSDI","author":"Madhyastha H. V.","year":"2009","unstructured":"H. V. Madhyastha , E. Katz-Bassett , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane Nano: path prediction for peer-to-peer applications . In Proc. NSDI , Apr. 2009 . H. V. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane Nano: path prediction for peer-to-peer applications. In Proc. NSDI, Apr. 2009."},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. NSDI","author":"Mahajan R.","year":"2005","unstructured":"R. Mahajan , M. Rodrig , D. Wetherall , and J. Zahorjan . Sustaining cooperation in multi-hop wireless networks . In Proc. NSDI , May 2005 . R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Sustaining cooperation in multi-hop wireless networks. In Proc. NSDI, May 2005."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/946243.946305"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159937"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032162.2032165"},{"key":"e_1_3_2_2_26_1","volume-title":"Congestion control in IP\/TCP internetworks. RFC","author":"Nagle J.","year":"1984","unstructured":"J. Nagle . Congestion control in IP\/TCP internetworks. RFC 896, Jan 1984 . J. Nagle. Congestion control in IP\/TCP internetworks. RFC 896, Jan 1984."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_2_28_1","unstructured":"W. B. Norton. A study of 28 peering policies. Technical report DrPeering International.  W. B. Norton. A study of 28 peering policies. Technical report DrPeering International."},{"key":"e_1_3_2_2_29_1","unstructured":"One Step Consulting Inc. BGP community guides. http:\/\/onesc.net\/communities 2012.  One Step Consulting Inc. BGP community guides. http:\/\/onesc.net\/communities 2012."},{"key":"e_1_3_2_2_30_1","first-page":"38","article-title":"Peering Dragnet: anti-social behavior amongst peers, and what you can do about it","author":"Patrick N.","year":"2006","unstructured":"N. Patrick , T. Scholl , A. Shaikh , and R. Steenbergen . Peering Dragnet: anti-social behavior amongst peers, and what you can do about it . NANOG 38 , 2006 . N. Patrick, T. Scholl, A. Shaikh, and R. Steenbergen. Peering Dragnet: anti-social behavior amongst peers, and what you can do about it. NANOG 38, 2006.","journal-title":"NANOG"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2007.24"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4271","volume-title":"A border gateway protocol 4 (BGP-4). RFC","author":"Rekhter Y.","year":"2006","unstructured":"Y. Rekhter , T. Li , and S. Hares . A border gateway protocol 4 (BGP-4). RFC 4271, Jan 2006 . Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (BGP-4). RFC 4271, Jan 2006."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402993"},{"key":"e_1_3_2_2_36_1","volume-title":"RFC 1997","author":"Traina P.","year":"1996","unstructured":"P. Traina and R. Chandrasekeran . BGP communities attribute . RFC 1997 , Aug 1996 . P. Traina and R. Chandrasekeran. BGP communities attribute. RFC 1997, Aug 1996."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266980"},{"key":"e_1_3_2_2_38_1","volume-title":"BGP route flap damping. RFC","author":"Villamizar C.","year":"1998","unstructured":"C. Villamizar , R. Chandra , and R. Govindan . BGP route flap damping. RFC 2439, Nov 1998 . C. Villamizar, R. Chandra, and R. Govindan. BGP route flap damping. RFC 2439, Nov 1998."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"},{"issue":"3","key":"e_1_3_2_2_40_1","first-page":"15","article-title":"Securing BGP through Secure Orig","volume":"6","author":"White R.","year":"2006","unstructured":"R. White . Securing BGP through Secure Orig in BGP. The Internet Protocol Journal , 6 ( 3 ): 15 -- 22 , 2006 . R. White. Securing BGP through Secure Origin BGP. The Internet Protocol Journal, 6(3):15--22, 2006.","journal-title":"BGP. The Internet Protocol Journal"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281123"},{"key":"e_1_3_2_2_42_1","volume-title":"Proc. NSDI","author":"Wu J.","year":"2005","unstructured":"J. Wu , Z. M. Mao , J. Rexford , and J. Wang . Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network . In Proc. NSDI , May 2005 . J. Wu, Z. M. Mao, J. Rexford, and J. Wang. Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network. In Proc. NSDI, May 2005."}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Helsinki Finland","acronym":"SIGCOMM '12"},"container-title":["Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342356.2342434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:23Z","timestamp":1750238483000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,13]]},"references-count":41,"alternative-id":["10.1145\/2342356.2342434","10.1145\/2342356"],"URL":"https:\/\/doi.org\/10.1145\/2342356.2342434","relation":{},"subject":[],"published":{"date-parts":[[2012,8,13]]},"assertion":[{"value":"2012-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}