{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:00Z","timestamp":1750308540359,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,18]],"date-time":"2014-06-18T00:00:00Z","timestamp":1403049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,18]]},"DOI":"10.1145\/2619287.2619292","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["User-defined actions for SDN"],"prefix":"10.1145","author":[{"given":"Hamid","family":"Farhadi","sequence":"first","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Ping","family":"Du","sequence":"additional","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Akihiro","family":"Nakao","sequence":"additional","affiliation":[{"name":"The University of Tokyo"}]}],"member":"320","published-online":{"date-parts":[[2014,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Open Networking Foundation. https:\/\/www.opennetworking.org\/.  Open Networking Foundation. https:\/\/www.opennetworking.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"OpenDayLight. http:\/\/www.opendaylight.org\/.  OpenDayLight. http:\/\/www.opendaylight.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Nakao. FLARE: Open Deeply Programmable Switch. In The 16th GENI Engineering Conference","author":"Akihiro","year":"2012","unstructured":"Akihiro Nakao. FLARE: Open Deeply Programmable Switch. In The 16th GENI Engineering Conference , 2012 . Akihiro Nakao. FLARE: Open Deeply Programmable Switch. In The 16th GENI Engineering Conference, 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851266"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.24"},{"key":"e_1_3_2_1_7_1","volume-title":"USNIX NSDI","author":"Fayazbakhsh S. K.","year":"2014","unstructured":"S. K. Fayazbakhsh , L. Chiang , V. Sekar , M. Yu , and J. C. Mogul . Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags . In USNIX NSDI , 2014 . S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul. Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags. In USNIX NSDI, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963588"},{"key":"e_1_3_2_1_9_1","unstructured":"C. Inc. Cisco guide to securing cisco nx-os software devices.  C. Inc. Cisco guide to securing cisco nx-os software devices."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592592"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_13_1","volume-title":"ITU-T News","author":"Nakao A.","year":"2013","unstructured":"A. Nakao . Deep programmability in communication infrastructure A closer look at software-defined networking and network functions virtualization , ITU-T News , 2013 . A. Nakao. Deep programmability in communication infrastructure A closer look at software-defined networking and network functions virtualization, ITU-T News, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.307"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX OSDI","author":"Popa L.","year":"2010","unstructured":"L. Popa , N. Egi , S. Ratnasamy , and I. Stoica . Building extensible networks with rule-based forwarding . In USENIX OSDI , 2010 . L. Popa, N. Egi, S. Ratnasamy, and I. Stoica. Building extensible networks with rule-based forwarding. In USENIX OSDI, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of Network and Distributed Security Symposium","author":"Shin S.","year":"2013","unstructured":"S. Shin , P. Porras , V. Yegneswaran , M. Fong , G. Gu , and M. Tyson . FRESCO: Modular composable security services for software-defined networks . In Proceedings of Network and Distributed Security Symposium , 2013 . S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson. FRESCO: Modular composable security services for software-defined networks. In Proceedings of Network and Distributed Security Symposium, 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Addison-Wesley Longman Publishing Co","author":"Stallings W.","year":"1998","unstructured":"W. Stallings . SNMP , SNMPv2, SNMPv3, and RMON 1 and 2. Addison-Wesley Longman Publishing Co ., 1998 . W. Stallings. SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Addison-Wesley Longman Publishing Co., 1998."},{"key":"e_1_3_2_1_18_1","volume-title":"Forces forwarding element model. IETF draft, work in progress, draft-ietf-forces-model-04.txt","author":"Yang L.","year":"2005","unstructured":"L. Yang , J. Halpern , R. Gopal , A. DeKok , Z. Haraszti , S. Blake , and E. Deleganes . Forces forwarding element model. IETF draft, work in progress, draft-ietf-forces-model-04.txt , 2005 . L. Yang, J. Halpern, R. Gopal, A. DeKok, Z. Haraszti, S. Blake, and E. Deleganes. Forces forwarding element model. IETF draft, work in progress, draft-ietf-forces-model-04.txt, 2005."}],"event":{"name":"CFI '14: International Conference of Future Internet 2014","sponsor":["JSPS Japanese Society for the Promotion of Science","WIDE"],"location":"Tokyo Japan","acronym":"CFI '14"},"container-title":["Proceedings of The Ninth International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2619287.2619292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2619287.2619292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:14Z","timestamp":1750272974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2619287.2619292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,18]]},"references-count":18,"alternative-id":["10.1145\/2619287.2619292","10.1145\/2619287"],"URL":"https:\/\/doi.org\/10.1145\/2619287.2619292","relation":{},"subject":[],"published":{"date-parts":[[2014,6,18]]},"assertion":[{"value":"2014-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}