{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:07:41Z","timestamp":1769731661097,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T00:00:00Z","timestamp":1429228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1017784,1321006"],"award-info":[{"award-number":["1017784,1321006"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"Microsoft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,17]]},"DOI":"10.1145\/2741948.2741963","type":"proceedings-article","created":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T12:40:32Z","timestamp":1428928832000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["ConfValley"],"prefix":"10.1145","author":[{"given":"Peng","family":"Huang","sequence":"first","affiliation":[{"name":"University of California, San Diego"}]},{"given":"William J.","family":"Bolosky","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Abhishek","family":"Singh","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]}],"member":"320","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Amazon EC2 and RDS service disruption on April 21st 2011. http:\/\/aws.amazon.com\/message\/65648.  Amazon EC2 and RDS service disruption on April 21st 2011. http:\/\/aws.amazon.com\/message\/65648."},{"key":"e_1_3_2_2_2_1","unstructured":"ANTLR tool. http:\/\/www.antlr.org.  ANTLR tool. http:\/\/www.antlr.org."},{"key":"e_1_3_2_2_3_1","unstructured":"Apache CloudStack. http:\/\/cloudstack.apache.org.  Apache CloudStack. http:\/\/cloudstack.apache.org."},{"key":"e_1_3_2_2_4_1","unstructured":"AWS service outage on December 24th 2012. http:\/\/aws.amazon.com\/message\/680587.  AWS service outage on December 24th 2012. http:\/\/aws.amazon.com\/message\/680587."},{"key":"e_1_3_2_2_5_1","unstructured":"AWS service outage on October 22nd 2012. https:\/\/aws.amazon.com\/message\/680342.  AWS service outage on October 22nd 2012. https:\/\/aws.amazon.com\/message\/680342."},{"key":"e_1_3_2_2_6_1","unstructured":"Chef software. http:\/\/www.getchef.com\/chef.  Chef software. http:\/\/www.getchef.com\/chef."},{"key":"e_1_3_2_2_7_1","unstructured":"Discussions on configuration validation in OpenStack. http:\/\/lists.openstack.org\/pipermail\/openstack-dev\/2013-November\/018557.html.  Discussions on configuration validation in OpenStack. http:\/\/lists.openstack.org\/pipermail\/openstack-dev\/2013-November\/018557.html."},{"key":"e_1_3_2_2_8_1","unstructured":"Downtime outages and failures - understanding their true costs. http:\/\/www.evolven.com\/blog\/downtime-outages-and-failures-understanding-their-true-costs.html.  Downtime outages and failures - understanding their true costs. http:\/\/www.evolven.com\/blog\/downtime-outages-and-failures-understanding-their-true-costs.html."},{"key":"e_1_3_2_2_9_1","unstructured":"Facebook outage on September 23rd 2010. https:\/\/www.facebook.com\/notes\/facebook-engineering\/more-details-on-todays-outage\/431441338919.  Facebook outage on September 23rd 2010. https:\/\/www.facebook.com\/notes\/facebook-engineering\/more-details-on-todays-outage\/431441338919."},{"key":"e_1_3_2_2_10_1","unstructured":"Google API infrastructure outage on April 30th 2013. http:\/\/googledevelopers.blogspot.com\/2013\/05\/google-api-infrastructure-outage_3.html.  Google API infrastructure outage on April 30th 2013. http:\/\/googledevelopers.blogspot.com\/2013\/05\/google-api-infrastructure-outage_3.html."},{"key":"e_1_3_2_2_11_1","unstructured":"Google service outage on January 24th 2014. http:\/\/googleblog.blogspot.com\/2014\/01\/todays-outage-for-several-google.html.  Google service outage on January 24th 2014. http:\/\/googleblog.blogspot.com\/2014\/01\/todays-outage-for-several-google.html."},{"key":"e_1_3_2_2_12_1","unstructured":"Microsoft Azure. https:\/\/azure.microsoft.com\/en-us.  Microsoft Azure. https:\/\/azure.microsoft.com\/en-us."},{"key":"e_1_3_2_2_13_1","unstructured":"Microsoft Azure storage disruption in US south on December 28th 2012. http:\/\/blogs.msdn.com\/b\/windowsazure\/archive\/2013\/01\/16\/details-of-the-december-28th-2012--windows-azure-storage-disruption-in-us-south.aspx.  Microsoft Azure storage disruption in US south on December 28th 2012. http:\/\/blogs.msdn.com\/b\/windowsazure\/archive\/2013\/01\/16\/details-of-the-december-28th-2012--windows-azure-storage-disruption-in-us-south.aspx."},{"key":"e_1_3_2_2_14_1","unstructured":"Microsoft Azure storage disruption on February 22nd 2013. http:\/\/blogs.msdn.com\/b\/windowsazure\/archive\/2013\/03\/01\/details-of-the-february-22nd-2013-windows-azure-storage-disruption.aspx.  Microsoft Azure storage disruption on February 22nd 2013. http:\/\/blogs.msdn.com\/b\/windowsazure\/archive\/2013\/03\/01\/details-of-the-february-22nd-2013-windows-azure-storage-disruption.aspx."},{"key":"e_1_3_2_2_15_1","unstructured":"OpenStack. http:\/\/www.openstack.org.  OpenStack. http:\/\/www.openstack.org."},{"key":"e_1_3_2_2_16_1","unstructured":"Puppet software. http:\/\/puppetlabs.com\/.  Puppet software. http:\/\/puppetlabs.com\/."},{"key":"e_1_3_2_2_17_1","unstructured":"Rubick project for OpenStack. https:\/\/wiki.openstack.org\/wiki\/Rubick.  Rubick project for OpenStack. https:\/\/wiki.openstack.org\/wiki\/Rubick."},{"key":"e_1_3_2_2_18_1","unstructured":"Salt software. http:\/\/www.saltstack.com.  Salt software. http:\/\/www.saltstack.com."},{"key":"e_1_3_2_2_19_1","unstructured":"Twilio billing incident post-mortem: Breakdown analysis and root cause. https:\/\/www.twilio.com\/blog\/2013\/07\/billing-incident-post-mortem-breakdown-analysis-and-root-cause.html.  Twilio billing incident post-mortem: Breakdown analysis and root cause. https:\/\/www.twilio.com\/blog\/2013\/07\/billing-incident-post-mortem-breakdown-analysis-and-root-cause.html."},{"key":"e_1_3_2_2_20_1","first-page":"307","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (Hollywood, CA, USA, 2012), OSDI'12","author":"Attariyan M.","unstructured":"Attariyan , M. , Chow , M. , and Flinn , J . X-ray: Automating root-cause diagnosis of performance anomalies in production software . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (Hollywood, CA, USA, 2012), OSDI'12 , pp. 307 -- 320 . Attariyan, M., Chow, M., and Flinn, J. X-ray: Automating root-cause diagnosis of performance anomalies in production software. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (Hollywood, CA, USA, 2012), OSDI'12, pp. 307--320."},{"key":"e_1_3_2_2_21_1","first-page":"281","volume-title":"Proceedings of the 2008 USENIX Annual Technical Conference (Boston, Massachusetts, 2008), ATC'08","author":"Attariyan M.","unstructured":"Attariyan , M. , and Flinn , J . Using causality to diagnose configuration bugs . In Proceedings of the 2008 USENIX Annual Technical Conference (Boston, Massachusetts, 2008), ATC'08 , pp. 281 -- 286 . Attariyan, M., and Flinn, J. Using causality to diagnose configuration bugs. In Proceedings of the 2008 USENIX Annual Technical Conference (Boston, Massachusetts, 2008), ATC'08, pp. 281--286."},{"key":"e_1_3_2_2_22_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","author":"Attariyan M.","year":"2010","unstructured":"Attariyan , M. , and Flinn , J . Automating configuration troubleshooting with dynamic information flow analysis . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation ( Vancouver, BC, Canada , 2010 ), OSDI'10, pp. 1 -- 11 . Attariyan, M., and Flinn, J. Automating configuration troubleshooting with dynamic information flow analysis. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (Vancouver, BC, Canada, 2010), OSDI'10, pp. 1--11."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377866"},{"key":"e_1_3_2_2_24_1","first-page":"209","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation","author":"Cadar C.","year":"2008","unstructured":"Cadar , C. , Dunbar , D. , and Engler , D . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation ( San Diego, California , 2008 ), OSDI'08, pp. 209 -- 224 . Cadar, C., Dunbar, D., and Engler, D. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (San Diego, California, 2008), OSDI'08, pp. 209--224."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921176"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 19th USENIX Conference on Security","author":"Das T.","year":"2010","unstructured":"Das , T. , Bhagwan , R. , and Naldurg , P . Baaz: A system for detecting access control misconfigurations . In Proceedings of the 19th USENIX Conference on Security ( Washington, DC , 2010 ), USENIX Security'10, pp. 11--11. Das, T., Bhagwan, R., and Naldurg, P. Baaz: A system for detecting access control misconfigurations. In Proceedings of the 19th USENIX Conference on Security (Washington, DC, 2010), USENIX Security'10, pp. 11--11."},{"key":"e_1_3_2_2_27_1","first-page":"11","volume-title":"Proceedings of the 10th Conference on Hot Topics in Operating Systems (Santa Fe, NM, 2005), HOTOS'05","author":"DeTreville J.","unstructured":"DeTreville , J. Making system configuration more declarative . In Proceedings of the 10th Conference on Hot Topics in Operating Systems (Santa Fe, NM, 2005), HOTOS'05 , pp. 11 -- 11 . DeTreville, J. Making system configuration more declarative. In Proceedings of the 10th Conference on Hot Topics in Operating Systems (Santa Fe, NM, 2005), HOTOS'05, pp. 11--11."},{"key":"e_1_3_2_2_28_1","first-page":"1","volume-title":"Proceedings of the 2007 USENIX Annual Technical Conference (Santa Clara, CA, 2007), ATC'07","author":"Enck W.","unstructured":"Enck , W. , McDaniel , P. , Sen , S. , Sebos , P. , Spoerel , S. , Greenberg , A. , Rao , S. , and Aiello , W . Configuration management at massive scale: System design and experience . In Proceedings of the 2007 USENIX Annual Technical Conference (Santa Clara, CA, 2007), ATC'07 , pp. 6: 1 -- 6 :14. Enck, W., McDaniel, P., Sen, S., Sebos, P., Spoerel, S., Greenberg, A., Rao, S., and Aiello, W. Configuration management at massive scale: System design and experience. In Proceedings of the 2007 USENIX Annual Technical Conference (Santa Clara, CA, 2007), ATC'07, pp. 6:1--6:14."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251203.1251207"},{"key":"e_1_3_2_2_30_1","first-page":"157","volume-title":"Proceedings of the 38th International Conference on Dependable Systems and Networks (Anchorage, Alaska, USA, 2008), DSN'08","author":"Keller L.","unstructured":"Keller , L. , Upadhyaya , P. , and Candea , G . ConfErr: A tool for assessing resilience to human configuration errors . In Proceedings of the 38th International Conference on Dependable Systems and Networks (Anchorage, Alaska, USA, 2008), DSN'08 , pp. 157 -- 166 . Keller, L., Upadhyaya, P., and Candea, G. ConfErr: A tool for assessing resilience to human configuration errors. In Proceedings of the 38th International Conference on Dependable Systems and Networks (Anchorage, Alaska, USA, 2008), DSN'08, pp. 157--166."},{"key":"e_1_3_2_2_32_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","author":"Kushman N.","year":"2010","unstructured":"Kushman , N. , and Katabi , D . Enabling configuration-independent automation by non-expert users . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation ( Vancouver, BC, Canada , 2010 ), OSDI'10, pp. 1 -- 10 . Kushman, N., and Katabi, D. Enabling configuration-independent automation by non-expert users. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (Vancouver, BC, Canada, 2010), OSDI'10, pp. 1--10."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_2_35_1","unstructured":"Rockwood B. The DevOps transformation. http:\/\/www.usenix.org\/events\/lisa11\/tech\/slides\/rockwood.pdf.  Rockwood B. The DevOps transformation. http:\/\/www.usenix.org\/events\/lisa11\/tech\/slides\/rockwood.pdf."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294284"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251271"},{"key":"e_1_3_2_2_38_1","first-page":"159","volume-title":"Proceedings of the 17th USENIX Conference on System Administration (San Diego, CA, 2003), LISA '03","author":"Wang Y.-M.","unstructured":"Wang , Y.-M. , Verbowski , C. , Dunagan , J. , Chen , Y. , Wang , H. J. , Yuan , C. , and Zhang , Z . Strider: A black-box, state-based approach to change and configuration management and support . In Proceedings of the 17th USENIX Conference on System Administration (San Diego, CA, 2003), LISA '03 , pp. 159 -- 172 . Wang, Y.-M., Verbowski, C., Dunagan, J., Chen, Y., Wang, H. J., Yuan, C., and Zhang, Z. Strider: A black-box, state-based approach to change and configuration management and support. In Proceedings of the 17th USENIX Conference on System Administration (San Diego, CA, 2003), LISA '03, pp. 159--172."},{"key":"e_1_3_2_2_39_1","first-page":"6","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation","author":"Whitaker A.","year":"2004","unstructured":"Whitaker , A. , Cox , R. S. , and Gribble , S. D . Configuration debugging as search: Finding the needle in the haystack . In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation ( San Francisco, CA , 2004 ), OSDI'04, pp. 6 -- 6 . Whitaker, A., Cox, R. S., and Gribble, S. D. Configuration debugging as search: Finding the needle in the haystack. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation (San Francisco, CA, 2004), OSDI'04, pp. 6--6."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_2_41_1","first-page":"28","volume-title":"Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (Portland, OR, 2011), ATC'11","author":"Yuan D.","unstructured":"Yuan , D. , Xie , Y. , Panigrahy , R. , Yang , J. , Verbowski , C. , and Kumar , A . Context-based online configuration-error detection . In Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (Portland, OR, 2011), ATC'11 , pp. 28 -- 28 . Yuan, D., Xie, Y., Panigrahy, R., Yang, J., Verbowski, C., and Kumar, A. Context-based online configuration-error detection. In Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (Portland, OR, 2011), ATC'11, pp. 28--28."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"}],"event":{"name":"EuroSys '15: Tenth EuroSys Conference 2015","location":"Bordeaux France","acronym":"EuroSys '15","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Tenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2741948.2741963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2741948.2741963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:37Z","timestamp":1750227157000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2741948.2741963"}},"subtitle":["a systematic configuration validation framework for cloud services"],"short-title":[],"issued":{"date-parts":[[2015,4,17]]},"references-count":41,"alternative-id":["10.1145\/2741948.2741963","10.1145\/2741948"],"URL":"https:\/\/doi.org\/10.1145\/2741948.2741963","relation":{},"subject":[],"published":{"date-parts":[[2015,4,17]]},"assertion":[{"value":"2015-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}