{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T06:45:22Z","timestamp":1768027522923,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation US","doi-asserted-by":"publisher","award":["DGE-1723440 OAC-1642031 SaTC-1528099"],"award-info":[{"award-number":["DGE-1723440 OAC-1642031 SaTC-1528099"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Naval Research Lab","award":["N00173-15-G017"],"award-info":[{"award-number":["N00173-15-G017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,19]]},"DOI":"10.1145\/3309194.3309196","type":"proceedings-article","created":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T12:18:36Z","timestamp":1553516316000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SDNSOC"],"prefix":"10.1145","author":[{"given":"Ankur","family":"Chowdhary","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Myong","family":"Kang","sequence":"additional","affiliation":[{"name":"US Naval Research Lab, Washington, DC, USA"}]},{"given":"Anya","family":"Kim","sequence":"additional","affiliation":[{"name":"US Naval Research Lab, Washington, DC, USA"}]},{"given":"Alexander","family":"Velazquez","sequence":"additional","affiliation":[{"name":"US Naval Research Lab, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169868"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/365411.365791"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491203"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"e_1_3_2_1_6_1","volume-title":"Pearson Education","author":"Frahim J.","year":"2009","unstructured":"Frahim , J. , and Santos , O . Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance . Pearson Education , 2009 . Frahim, J., and Santos, O. Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance. Pearson Education, 2009."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351210768"},{"key":"e_1_3_2_1_9_1","unstructured":"Kazemian P. Header space analysis: Static checking for networks.  Kazemian P. Header space analysis: Static checking for networks."},{"key":"e_1_3_2_1_10_1","unstructured":"Kazemian P. Zeng H. Varghese G. McKeown N. and Whyte S. Real time network policy checking using header space analysis.  Kazemian P. Zeng H. Varghese G. McKeown N. and Whyte S. Real time network policy checking using header space analysis."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860466"},{"key":"e_1_3_2_1_13_1","volume-title":"Brew: A security policy analysis framework for distributed sdn-based cloud environments","author":"Pisharody S.","year":"2017","unstructured":"Pisharody , S. , Natarajan , J. , Chowdhary , A. , Alshalan , A. , and Huang , D . Brew: A security policy analysis framework for distributed sdn-based cloud environments . IEEE Transactions on Dependable and Secure Computing ( 2017 ). Pisharody, S., Natarajan, J., Chowdhary, A., Alshalan, A., and Huang, D. Brew: A security policy analysis framework for distributed sdn-based cloud environments. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787506"},{"key":"e_1_3_2_1_16_1","volume-title":"Problem statement for service function chaining. Tech. rep","author":"Quinn P.","year":"2015","unstructured":"Quinn , P. , and Nadeau , T . Problem statement for service function chaining. Tech. rep ., 2015 . Quinn, P., and Nadeau, T. Problem statement for service function chaining. Tech. rep., 2015."},{"key":"e_1_3_2_1_17_1","unstructured":"Sherry J. Ratnasamy S. and At J. S. A survey of enterprise middlebox deployments.  Sherry J. Ratnasamy S. and At J. S. A survey of enterprise middlebox deployments."},{"key":"e_1_3_2_1_18_1","volume-title":"20th Annual Network & Distributed System Security Symposium","author":"Shin S. W.","year":"2013","unstructured":"Shin , S. W. , Porras , P. , Yegneswara , V. , Fong , M. , Gu , G. , and Tyson , M . Fresco: Modular composable security services for software-defined networks . In 20th Annual Network & Distributed System Security Symposium ( 2013 ), NDSS. Shin, S. W., Porras, P., Yegneswara, V., Fong, M., Gu, G., and Tyson, M. Fresco: Modular composable security services for software-defined networks. In 20th Annual Network & Distributed System Security Symposium (2013), NDSS."},{"key":"e_1_3_2_1_19_1","volume-title":"Sics: Secure in-cloud service function chaining. arXiv preprint arXiv:1606.07079","author":"Wang H.","year":"2016","unstructured":"Wang , H. , Li , X. , Zhao , Y. , Yu , Y. , Yang , H. , and Qian , C . Sics: Secure in-cloud service function chaining. arXiv preprint arXiv:1606.07079 ( 2016 ). Wang, H., Li, X., Zhao, Y., Yu, Y., Yang, H., and Qian, C. Sics: Secure in-cloud service function chaining. arXiv preprint arXiv:1606.07079 (2016)."}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","location":"Richardson Texas USA","acronym":"CODASPY '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309194.3309196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309194.3309196","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309194.3309196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:22Z","timestamp":1750268962000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309194.3309196"}},"subtitle":["Object Oriented SDN Framework"],"short-title":[],"issued":{"date-parts":[[2019,3,19]]},"references-count":19,"alternative-id":["10.1145\/3309194.3309196","10.1145\/3309194"],"URL":"https:\/\/doi.org\/10.1145\/3309194.3309196","relation":{},"subject":[],"published":{"date-parts":[[2019,3,19]]},"assertion":[{"value":"2019-03-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}