{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:45:27Z","timestamp":1768016727952,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818034","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"51-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Proactive Security Analysis of Changes in Virtualized Infrastructures"],"prefix":"10.1145","author":[{"given":"S\u00f6ren","family":"Bleikertz","sequence":"first","affiliation":[{"name":"IBM Research - Zurich"}]},{"given":"Carsten","family":"Vogel","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich"}]},{"given":"Thomas","family":"Gro\u00df","sequence":"additional","affiliation":[{"name":"Newcastle University"}]},{"given":"Sebastian","family":"M\u00f6dersheim","sequence":"additional","affiliation":[{"name":"DTU Compute"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341312.1341321"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2011.10"},{"key":"e_1_3_2_1_4_1","volume-title":"Automated Information Flow Analysis of Virtualized Infrastructures. In 16th European Symposium on Research in Computer Security (ESORICS'11)","author":"Bleikertz S.","year":"2011","unstructured":"Bleikertz , S. , Gross , T. , Schunter , M. , and Eriksson , K . Automated Information Flow Analysis of Virtualized Infrastructures. In 16th European Symposium on Research in Computer Security (ESORICS'11) ( Sep 2011 ), Springer. Bleikertz, S., Gross, T., Schunter, M., and Eriksson, K. Automated Information Flow Analysis of Virtualized Infrastructures. In 16th European Symposium on Research in Computer Security (ESORICS'11) (Sep 2011), Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664274"},{"key":"e_1_3_2_1_6_1","volume-title":"Cloud Security Alliance (CSA), mar","author":"Top 0.","year":"2010","unstructured":"CSA. Top threats to cloud computing v1. 0. Tech . rep ., Cloud Security Alliance (CSA), mar 2010 . CSA. Top threats to cloud computing v1.0. Tech. rep., Cloud Security Alliance (CSA), mar 2010."},{"key":"e_1_3_2_1_7_1","volume-title":"Cloud computing: Benefits, risks and recommendations for information security. Tech. rep","author":"ENISA.","year":"2009","unstructured":"ENISA. Cloud computing: Benefits, risks and recommendations for information security. Tech. rep ., European Network and Information Security Agency (ENISA) , nov 2009 . ENISA. Cloud computing: Benefits, risks and recommendations for information security. Tech. rep., European Network and Information Security Agency (ENISA), nov 2009."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841883_27"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3115955.3116014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211920"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.32"},{"key":"e_1_3_2_1_13_1","first-page":"99","volume-title":"Real Time Network Policy Checking Using Header Space Analysis. In 10th USENIX Symposium on Networked Systems Design and Implementation","author":"Kazemian P.","year":"2013","unstructured":"Kazemian , P. , Chang , M. , Zeng , H. , Varghese , G. , McKeown , N. , and Whyte , S . Real Time Network Policy Checking Using Header Space Analysis. In 10th USENIX Symposium on Networked Systems Design and Implementation ( 2013 ), pp. 99 -- 111 . Kazemian, P., Chang, M., Zeng, H., Varghese, G., McKeown, N., and Whyte, S. Real Time Network Policy Checking Using Header Space Analysis. In 10th USENIX Symposium on Networked Systems Design and Implementation (2013), pp. 99--111."},{"key":"e_1_3_2_1_14_1","first-page":"15","volume-title":"VeriFlow: Verifying Network-Wide Invariants in Real Time. In 10th USENIX Symposium on Networked Systems Design and Implementation","author":"Khurshid A.","year":"2013","unstructured":"Khurshid , A. , Zou , X. , Zhou , W. , Caesar , M. , and Godfrey , P. B . VeriFlow: Verifying Network-Wide Invariants in Real Time. In 10th USENIX Symposium on Networked Systems Design and Implementation ( 2013 ), pp. 15 -- 27 . Khurshid, A., Zou, X., Zhou, W., Caesar, M., and Godfrey, P. B. VeriFlow: Verifying Network-Wide Invariants in Real Time. In 10th USENIX Symposium on Networked Systems Design and Implementation (2013), pp. 15--27."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838285"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068863"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545191"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_19_1","first-page":"15","volume-title":"Proceedings of the 19th conference on Large Installation System Administration Conference -","volume":"19","author":"Narain S.","year":"2005","unstructured":"Narain , S. Network Configuration Management via Model Finding . In Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19 ( 2005 ), LISA '05, pp. 15 -- 15 . Narain, S. Network Configuration Management via Model Finding. In Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19 (2005), LISA '05, pp. 15--15."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems -","volume":"4","author":"Oppenheimer D.","year":"2003","unstructured":"Oppenheimer , D. , Ganapathi , A. , and Patterson , D. A . Why do internet services fail, and what can be done about it? In Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4 ( 2003 ). Oppenheimer, D., Ganapathi, A., and Patterson, D. A. Why do internet services fail, and what can be done about it? In Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4 (2003)."},{"key":"e_1_3_2_1_21_1","series-title":"Electronic Communications of the EASST","volume-title":"Graph transformation and visual modelling techniques","author":"Rensink A.","year":"2009","unstructured":"Rensink , A. , and Kuperus , J . -H. Repotting the geraniums: on nested graph transformation rules . In Graph transformation and visual modelling techniques ( 2009 ), vol. 18 of Electronic Communications of the EASST . Rensink, A., and Kuperus, J.-H. Repotting the geraniums: on nested graph transformation rules. In Graph transformation and visual modelling techniques (2009), vol. 18 of Electronic Communications of the EASST."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/278918"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2013.37"},{"key":"e_1_3_2_1_26_1","first-page":"2","volume":"1","author":"Shafer I.","year":"2012","unstructured":"Shafer , I. , Gylfason , S. , and Ganger , G. R. v Query : a Platform for Connecting Configuration and Performance. VMware Technical Journal 1 , 2 ( Dec. 2012 ). Shafer, I., Gylfason, S., and Ganger, G. R. vQuery: a Platform for Connecting Configuration and Performance. VMware Technical Journal 1, 2 (Dec. 2012).","journal-title":"Platform for Connecting Configuration and Performance. VMware Technical Journal"},{"key":"e_1_3_2_1_27_1","volume-title":"Aug","author":"Mware","year":"2011","unstructured":"V Mware . vSphere 5.0 API Reference , Aug 2011 . http:\/\/pubs.vmware.com\/vsphere-50\/topic\/com.vmware.wssdk.apiref.doc_50\/right-pane.html. VMware. vSphere 5.0 API Reference, Aug 2011. http:\/\/pubs.vmware.com\/vsphere-50\/topic\/com.vmware.wssdk.apiref.doc_50\/right-pane.html."},{"key":"e_1_3_2_1_28_1","volume-title":"ESXi 5.5, vCenter Server 5.5 (EN-001164-04)","author":"Mware","year":"2013","unstructured":"V Mware . vSphere Security , ESXi 5.5, vCenter Server 5.5 (EN-001164-04) , 2013 . VMware. vSphere Security, ESXi 5.5, vCenter Server 5.5 (EN-001164-04), 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655021"}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","location":"Los Angeles CA USA","acronym":"ACSAC 2015","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":29,"alternative-id":["10.1145\/2818000.2818034","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818034","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}