{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:33Z","timestamp":1750306713715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1145\/2670386.2670395","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving root cause failure analysis in virtual networks via the interconnected-asset ontology"],"prefix":"10.1145","author":[{"given":"Henk","family":"Birkholz","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany"}]},{"given":"Ingo","family":"Sieverdingbeck","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IO development website. URL: http:\/\/dev.tzi.org\/io\/.  IO development website. URL: http:\/\/dev.tzi.org\/io\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2014.7152636"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.23"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.73"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.46"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 9th Conference on Hot Topics in Operating Systems -","volume":"9","author":"Blake C.","year":"2003"},{"volume-title":"The Internet Engineering Task Force (IETF)","year":"2014","author":"N.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2014.Tu2I.4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5183468"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"F.\n       \n      Dabek B.\n       \n      Zhao P.\n       \n      Druschel J.\n       \n      Kubiatowicz and \n      \n      \n      I.\n       \n      Stoica\n      \n  \n  . \n  Towards a common api for structured peer-to-peer overlays. In M. Kaashoek and I. Stoica editors Peer-to-Peer Systems II volume \n  2735\n   of \n  Lecture Notes in Computer Science\n  . \n  Springer Berlin Heidelberg 2003\n  .  F. Dabek B. Zhao P. Druschel J. Kubiatowicz and I. Stoica. Towards a common api for structured peer-to-peer overlays. In M. Kaashoek and I. Stoica editors Peer-to-Peer Systems II volume 2735 of Lecture Notes in Computer Science. Springer Berlin Heidelberg 2003.","DOI":"10.1007\/978-3-540-45172-3_3"},{"volume-title":"The Internet Engineering Task Force (IETF)","year":"2014","author":"Ed B.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Future Network Mobile Summit (FutureNetw), 2012","author":"Fuentes B.","year":"2012"},{"volume-title":"The Internet Engineering Task Force (IETF)","year":"1989","author":"Hagens R.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6178831"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.917711"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"M. Mahalingam M. and Dutt D. and Duda K. and Agarwal P. and Kreeger L. and Sridhar T. and Bursell M. and Wright C. VXLAN: A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. Internet-Draft draft-mahalingam-dutt-dcops-vxlan-09 The Internet Engineering Task Force (IETF) April 2014.  M. Mahalingam M. and Dutt D. and Duda K. and Agarwal P. and Kreeger L. and Sridhar T. and Bursell M. and Wright C. VXLAN: A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. Internet-Draft draft-mahalingam-dutt-dcops-vxlan-09 The Internet Engineering Task Force (IETF) April 2014.","DOI":"10.17487\/rfc7348"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238054"},{"volume-title":"The Internet Engineering Task Force (IETF)","year":"1998","author":"Moy J.","key":"e_1_3_2_1_20_1"},{"volume-title":"The Internet Engineering Task Force (IETF)","year":"1987","author":"Network Working Group","key":"e_1_3_2_1_21_1"},{"volume-title":"NSDI. USENIX","year":"2004","author":"Rodriguez A.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Sangster P. and Khosravi H. and Mani M. and Narayan K. and Tardo J. Network Endpoint Assessment (NEA): Overview and Requirements 2008.  Sangster P. and Khosravi H. and Mani M. and Narayan K. and Tardo J. Network Endpoint Assessment (NEA): Overview and Requirements 2008.","DOI":"10.17487\/rfc5209"},{"key":"e_1_3_2_1_24_1","unstructured":"TCG Trusted Network Connect. TNC Architecture for Interoperability 2012. Version 1.5 Revision 3.  TCG Trusted Network Connect. TNC Architecture for Interoperability 2012. Version 1.5 Revision 3."},{"key":"e_1_3_2_1_25_1","unstructured":"World Wide Web Consortium (W3C). OWL 2 Web Ontology Language Document Overview. Technical report 2009.  World Wide Web Consortium (W3C). OWL 2 Web Ontology Language Document Overview. Technical report 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation -","volume":"6","author":"Zhang M.","year":"2004"}],"event":{"name":"IPTComm '14: Principles, Systems and Applications of IP Telecommunications","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Chicago Illinois","acronym":"IPTComm '14"},"container-title":["Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670386.2670395","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2670386.2670395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:20Z","timestamp":1750231160000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670386.2670395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":26,"alternative-id":["10.1145\/2670386.2670395","10.1145\/2670386"],"URL":"https:\/\/doi.org\/10.1145\/2670386.2670395","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]},"assertion":[{"value":"2014-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}