{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:51Z","timestamp":1771700211723,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,16]],"date-time":"2013-08-16T00:00:00Z","timestamp":1376611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,16]]},"DOI":"10.1145\/2491185.2491203","type":"proceedings-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T14:07:21Z","timestamp":1377007641000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":157,"title":["FlowTags"],"prefix":"10.1145","author":[{"given":"Seyed Kaveh","family":"Fayazbakhsh","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]},{"given":"Minlan","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, USA"}]},{"given":"Jeffrey C.","family":"Mogul","sequence":"additional","affiliation":[{"name":"Google Inc., San Francisco, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2012 Cloud Networking Report. http:\/\/www.webtorials.com\/content\/2012\/11\/2012-cloud-networking-report.html.  2012 Cloud Networking Report. http:\/\/www.webtorials.com\/content\/2012\/11\/2012-cloud-networking-report.html."},{"key":"e_1_3_2_1_2_1","unstructured":"ONF Expands Scope; Drives Technical Work Forward.  ONF Expands Scope; Drives Technical Work Forward."},{"key":"e_1_3_2_1_3_1","unstructured":"https:\/\/www.opennetworking.org\/media\/press-releases\/564-onf-expands-scope-drives-technical-work-forward.  https:\/\/www.opennetworking.org\/media\/press-releases\/564-onf-expands-scope-drives-technical-work-forward."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517484"},{"key":"e_1_3_2_1_5_1","unstructured":"S. Amante B. Carpenter S. Jiang and J. Rajahalme. IPv6 Flow Label Update. http:\/\/rmv6tf.org\/wp-content\/uploads\/2012\/11\/rmv6tf-flow-label11.pdf.  S. Amante B. Carpenter S. Jiang and J. Rajahalme. IPv6 Flow Label Update. http:\/\/rmv6tf.org\/wp-content\/uploads\/2012\/11\/rmv6tf-flow-label11.pdf."},{"key":"e_1_3_2_1_7_1","volume-title":"Stratos: Virtual Middleboxes as First-Class Entities. UW-Madison TR1771","author":"Gember A.","year":"2012","unstructured":"A. Gember Stratos: Virtual Middleboxes as First-Class Entities. UW-Madison TR1771 , 2012 . A. Gember et al. Stratos: Virtual Middleboxes as First-Class Entities. UW-Madison TR1771, 2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390233"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402966"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: static checking for networks . In Proc. NSDI , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: static checking for networks. In Proc. NSDI, 2012."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. NSDI","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , W. Zhou , M. Caesar , and P. B. Godfrey . Veriflow: verifying network-wide invariants in real time . In Proc. NSDI , 2013 . A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey. Veriflow: verifying network-wide invariants in real time. In Proc. NSDI, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"e_1_3_2_1_13_1","unstructured":"N. McKeown. Mind the Gap: SIGCOMM'12 Keynote. http:\/\/www.youtube.com\/watch?v=Ho239zpKMwQ.  N. McKeown. Mind the Gap: SIGCOMM'12 Keynote. http:\/\/www.youtube.com\/watch?v=Ho239zpKMwQ."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103685"},{"key":"e_1_3_2_1_15_1","unstructured":"Y. Mundada etal Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. http:\/\/hdl.handle.net\/1853\/36612.  Y. Mundada et al. Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. http:\/\/hdl.handle.net\/1853\/36612."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. NDSS","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proc. NDSS , 2005 . J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. NDSS, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921192"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. NSDI","author":"Sekar V.","year":"2012","unstructured":"V. Sekar Design and implementation of a consolidated middlebox architecture . In Proc. NSDI , 2012 . V. Sekar et al. Design and implementation of a consolidated middlebox architecture. In Proc. NSDI, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","location":"Hong Kong China","acronym":"SIGCOMM'13","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491185.2491203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491185.2491203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:37Z","timestamp":1750235977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491185.2491203"}},"subtitle":["enforcing network-wide policies in the presence of dynamic middlebox actions"],"short-title":[],"issued":{"date-parts":[[2013,8,16]]},"references-count":20,"alternative-id":["10.1145\/2491185.2491203","10.1145\/2491185"],"URL":"https:\/\/doi.org\/10.1145\/2491185.2491203","relation":{},"subject":[],"published":{"date-parts":[[2013,8,16]]},"assertion":[{"value":"2013-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}