{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T18:48:29Z","timestamp":1777661309487,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T00:00:00Z","timestamp":1566172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,19]]},"DOI":"10.1145\/3341302.3342088","type":"proceedings-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T19:32:36Z","timestamp":1565811156000},"page":"214-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["Safely and automatically updating in-network ACL configurations with intent language"],"prefix":"10.1145","author":[{"given":"Bingchuan","family":"Tian","sequence":"first","affiliation":[{"name":"Nanjing University"}]},{"given":"Xinyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California Santa Barbara"}]},{"given":"Ennan","family":"Zhai","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Hongqiang Harry","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Qiaobo","family":"Ye","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Chunsheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Xin","family":"Wu","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Zhiming","family":"Ji","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Yihong","family":"Sang","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group"}]},{"given":"Da","family":"Yu","sequence":"additional","affiliation":[{"name":"Brown University and Alibaba Group"}]},{"given":"Chen","family":"Tian","sequence":"additional","affiliation":[{"name":"Nanjing University"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago"}]}],"member":"320","published-online":{"date-parts":[[2019,8,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230583"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062367"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.50"},{"key":"e_1_3_2_2_6_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Cardwell N.","year":"2013","unstructured":"Cardwell , N. , Cheng , Y. , Brakmo , L. , Mathis , M. , Raghavan , B. , Dukkipati , N. , Chu , H.-k. J. , Terzis , A. , and Herbert , T . Packetdrill: scriptable network stack testing, from sockets to packets . In USENIX Annual Technical Conference (ATC) ( 2013 ). Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H.-k. J., Terzis, A., and Herbert, T. Packetdrill: scriptable network stack testing, from sockets to packets. In USENIX Annual Technical Conference (ATC) (2013)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240166.2240177"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/321033.321034"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_14"},{"key":"e_1_3_2_2_11_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"El-Hassany A.","year":"2018","unstructured":"El-Hassany , A. , Tsankov , P. , Vanbever , L. , and Vechev , M. T . NetComplete: Practical network-wide configuration synthesis with autocompletion . In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2018 ). El-Hassany, A., Tsankov, P., Vanbever, L., and Vechev, M. T. NetComplete: Practical network-wide configuration synthesis with autocompletion. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2018)."},{"key":"e_1_3_2_2_12_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Fayaz S. K.","year":"2016","unstructured":"Fayaz , S. K. , Sharma , T. , Fogel , A. , Mahajan , R. , Millstein , T. , Sekar , V. , and Varghese , G . Efficient network reachability analysis using a succinct control plane representation . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) ( 2016 ). Fayaz, S. K., Sharma, T., Fogel, A., Mahajan, R., Millstein, T., Sekar, V., and Varghese, G. Efficient network reachability analysis using a succinct control plane representation. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2016)."},{"key":"e_1_3_2_2_13_1","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Fogel A.","year":"2015","unstructured":"Fogel , A. , Fung , S. , Pedrosa , L. , Walraed-Sullivan , M. , Govindan , R. , Mahajan , R. , and Millstein , T . A general approach to network configuration analysis . In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2015 ). Fogel, A., Fung, S., Pedrosa, L., Walraed-Sullivan, M., Govindan, R., Mahajan, R., and Millstein, T. A general approach to network configuration analysis. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2015)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132753"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851212"},{"key":"e_1_3_2_2_17_1","volume-title":"Formal Methods in Computer Aided Design (FMCAD)","author":"Hallahan W. T.","year":"2017","unstructured":"Hallahan , W. T. , Zhai , E. , and Piskac , R . Automated repair by example for firewalls . In Formal Methods in Computer Aided Design (FMCAD) ( 2017 ). Hallahan, W. T., Zhai, E., and Piskac, R. Automated repair by example for firewalls. In Formal Methods in Computer Aided Design (FMCAD) (2017)."},{"key":"e_1_3_2_2_18_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (Mar.","author":"Horn A.","year":"2017","unstructured":"Horn , A. , Kheradmand , A. , and Prasad , M. R . Delta-net: Real-time network verification using atoms . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (Mar. 2017 ). Horn, A., Kheradmand, A., and Prasad, M. R. Delta-net: Real-time network verification using atoms. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (Mar. 2017)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.38"},{"key":"e_1_3_2_2_21_1","volume-title":"9th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Kazemian P.","year":"2012","unstructured":"Kazemian , P. , Varghese , G. , and McKeown , N. Header space analysis: Static checking for networks . In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2012 ). Kazemian, P., Varghese, G., and McKeown, N. Header space analysis: Static checking for networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2012)."},{"key":"e_1_3_2_2_22_1","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Khurshid A.","year":"2013","unstructured":"Khurshid , A. , Zhou , X. , Zhou , W. , Caesar , M. , and Godfrey , P. B . VeriFlow: Verifying network-wide invariants in real time . In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2013 ). Khurshid, A., Zhou, X., Zhou, W., Caesar, M., and Godfrey, P. B. VeriFlow: Verifying network-wide invariants in real time. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2013)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.289"},{"key":"e_1_3_2_2_24_1","volume-title":"12th USENIX Symposium on Networked System Design and Implementation (NSDI)","author":"Lopes N. P.","year":"2015","unstructured":"Lopes , N. P. , Bj\u00f8rner , N. , Godefroid , P. , Jayaraman , K. , and Varghese , G . Checking beliefs in dynamic networks . In 12th USENIX Symposium on Networked System Design and Implementation (NSDI) ( 2015 ). Lopes, N. P., Bj\u00f8rner, N., Godefroid, P., Jayaraman, K., and Varghese, G. Checking beliefs in dynamic networks. In 12th USENIX Symposium on Networked System Design and Implementation (NSDI) (2015)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9108-y"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774997"},{"key":"e_1_3_2_2_27_1","volume-title":"LIPIcs-Leibniz International Proceedings in Informatics","volume":"32","author":"Panda A.","year":"2015","unstructured":"Panda , A. , Argyraki , K. , Sagiv , M. , Schapira , M. , and Shenker , S . New directions for network verification . In LIPIcs-Leibniz International Proceedings in Informatics ( 2015 ), vol. 32 , Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Panda, A., Argyraki, K., Sagiv, M., Schapira, M., and Shenker, S. New directions for network verification. In LIPIcs-Leibniz International Proceedings in Informatics (2015), vol. 32, Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_2_28_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Panda A.","year":"2017","unstructured":"Panda , A. , Lahav , O. , Argyraki , K. J. , Sagiv , M. , and Shenker , S . Verifying reachability in networks with mutable datapaths . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2017 ). Panda, A., Lahav, O., Argyraki, K. J., Sagiv, M., and Shenker, S. Verifying reachability in networks with mutable datapaths. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2017)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(95)00045-3"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544034"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49674-9_51"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187924"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.172"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.16"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098833"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.24"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459944"}],"event":{"name":"SIGCOMM '19: ACM SIGCOMM 2019 Conference","location":"Beijing China","acronym":"SIGCOMM '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342088","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341302.3342088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,19]]},"references-count":38,"alternative-id":["10.1145\/3341302.3342088","10.1145\/3341302"],"URL":"https:\/\/doi.org\/10.1145\/3341302.3342088","relation":{},"subject":[],"published":{"date-parts":[[2019,8,19]]},"assertion":[{"value":"2019-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}