{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:18Z","timestamp":1750306578061,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":9,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2684793.2684796","type":"proceedings-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T13:51:05Z","timestamp":1418997065000},"page":"15-22","source":"Crossref","is-referenced-by-count":10,"title":["Security Analysis of Software Defined Networking Architectures"],"prefix":"10.1145","author":[{"given":"David","family":"Klingel","sequence":"first","affiliation":[]},{"given":"Rahamatullah","family":"Khondoker","sequence":"additional","affiliation":[]},{"given":"Ronald","family":"Marx","sequence":"additional","affiliation":[]},{"given":"Kpatcha","family":"Bayarou","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2684793.2684796-1","doi-asserted-by":"crossref","unstructured":"M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: taking control of the enterprise. ACM SIGCOMM Computer Communication Review, 37(4):1--12, October 2007.","DOI":"10.1145\/1282427.1282382"},{"key":"key-10.1145\/2684793.2684796-2","unstructured":"M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker. Sane: A protection architecture for enterprise networks. Proceedings of the 15th conference on USENIX Security Symposium, 15(10), August 2006."},{"key":"key-10.1145\/2684793.2684796-3","doi-asserted-by":"crossref","unstructured":"A. Farrel, J.-P. Vasseur, and J. Ash. A Path Computation Element (PCE)-Based Architecture (IETF RFC 4655), August 2006.","DOI":"10.17487\/rfc4655"},{"key":"key-10.1145\/2684793.2684796-4","doi-asserted-by":"crossref","unstructured":"N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, and J. van der Merwe. The case for separating routing from routers. Proceedings ACM SIGCOMM Workshop on Future Directions in Network Architecture, August 2004.","DOI":"10.1145\/1016707.1016709"},{"key":"key-10.1145\/2684793.2684796-5","doi-asserted-by":"crossref","unstructured":"A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4d approach to network control and management. ACM SIGCOMM Computer Communication Review, 35(5):41--54, October 2005.","DOI":"10.1145\/1096536.1096541"},{"key":"key-10.1145\/2684793.2684796-6","unstructured":"S. Hernan, S. Lambert, T. Ostwald, and A. Shostack. Threat modeling. uncover security design flaws using the stride approach. http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx. Online, accessed on: 06.06.2014."},{"key":"key-10.1145\/2684793.2684796-7","unstructured":"M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, 2nd edition, December 2002."},{"key":"key-10.1145\/2684793.2684796-8","doi-asserted-by":"crossref","unstructured":"D. Katz, K. Kompella, and D. Yeung. Traffic Engineering (TE) Extensions to OSPF Version 2 (IETF RFC 3630), September 2003.","DOI":"10.17487\/rfc3630"},{"key":"key-10.1145\/2684793.2684796-9","unstructured":"H. Yan, D. A. Maltz, T. S. E. Ng, H. Gogineni, H. Zhang, and Z. Cai. Tesseract: a 4d network control plane. Proceedings of the 4th USENIX conference on Networked systems design & implementation, pages 27--27, April 2007."}],"event":{"number":"14","sponsor":["SIGCOMM, ACM Special Interest Group on Data Communication","AIOT, Asian Institute of Technology"],"acronym":"AINTEC '14","name":"the AINTEC 2014","start":{"date-parts":[[2014,11,26]]},"location":"Chiang Mai, Thailand","end":{"date-parts":[[2014,11,28]]}},"container-title":["Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference - AINTEC '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684793.2684796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2684796&amp;ftid=1522814&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:41Z","timestamp":1750227221000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2684793.2684796"}},"subtitle":["PCE, 4D and SANE"],"proceedings-subject":"Asian Internet Engineering Conference","short-title":[],"issued":{"date-parts":[[2014]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1145\/2684793.2684796","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}