{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:14:36Z","timestamp":1764713676890,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T00:00:00Z","timestamp":1596412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,3]]},"DOI":"10.1145\/3411029.3411031","type":"proceedings-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T16:10:28Z","timestamp":1597162228000},"page":"8-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Fast Configuration Change Impact Analysis for Network Overlay Data Center Networks"],"prefix":"10.1145","author":[{"given":"Lizhao","family":"You","sequence":"first","affiliation":[{"name":"Huawei, China"}]},{"given":"Hao","family":"Tang","sequence":"additional","affiliation":[{"name":"Huawei, China"}]},{"given":"Jiahua","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei, China"}]},{"given":"Xiao","family":"Li","sequence":"additional","affiliation":[{"name":"Huawei, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Batfish. https:\/\/github.com\/batfish\/batfish  2020. Batfish. https:\/\/github.com\/batfish\/batfish"},{"volume-title":"Tiramisu: Fast Multilayer Network Verification. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","year":"2020","author":"Abhashkumar Anubhavnidhi","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866898.1866905"},{"volume-title":"Lecture Notes","author":"Andersen Henrik\u00a0Reif","key":"e_1_3_2_1_4_1"},{"volume-title":"Computer Aided Verification, Vol.\u00a011562","author":"Backes John","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_4"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"John Drake Wim Henderickx Ali Sajassi Rahul Aggarwal Dr. Nabil\u00a0N. Bitar Aldrin Isaac and Jim Uttaro. 2015. BGP MPLS-Based Ethernet VPN. RFC 7432. https:\/\/doi.org\/10.17487\/RFC7432  John Drake Wim Henderickx Ali Sajassi Rahul Aggarwal Dr. Nabil\u00a0N. Bitar Aldrin Isaac and Jim Uttaro. 2015. BGP MPLS-Based Ethernet VPN. RFC 7432. https:\/\/doi.org\/10.17487\/RFC7432","DOI":"10.17487\/rfc7432"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3323234.3323290"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026895"},{"volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","year":"2015","author":"Fogel Ari","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"volume-title":"Delta-net: Real-time Network Verification Using Atoms. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","year":"2017","author":"Horn Alex","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888144"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_16_1"},{"volume-title":"Real Time Network Policy Checking Using Header Space Analysis. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","year":"2013","author":"Kazemian Peyman","key":"e_1_3_2_1_17_1"},{"volume-title":"Header Space Analysis: Static Checking for Networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","year":"2012","author":"Kazemian Peyman","key":"e_1_3_2_1_18_1"},{"volume-title":"VeriFlow: Verifying Network-Wide Invariants in Real Time. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","year":"2013","author":"Khurshid Ahmed","key":"e_1_3_2_1_19_1"},{"volume-title":"Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","year":"2015","author":"Lopes P.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Mallik Mahalingam Dinesh Dutt Kenneth Duda Puneet Agarwal Larry Kreeger T. Sridhar Mike Bursell and Chris Wright. 2014. Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. RFC 7348. https:\/\/doi.org\/10.17487\/RFC7348  Mallik Mahalingam Dinesh Dutt Kenneth Duda Puneet Agarwal Larry Kreeger T. Sridhar Mike Bursell and Chris Wright. 2014. Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. RFC 7348. https:\/\/doi.org\/10.17487\/RFC7348","DOI":"10.17487\/rfc7348"},{"volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","year":"2020","author":"Prabhu Santhosh","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Michael Smith and Larry Kreeger. 2018. VXLAN Group Policy Option. Internet-Draft. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-smith-vxlan-group-policy-05  Michael Smith and Larry Kreeger. 2018. VXLAN Group Policy Option. Internet-Draft. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-smith-vxlan-group-policy-05"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Yushun Wang Taous Madi Suryadipta Majumdar Yosr Jarraya Amir Alimohammadifar Makan Pourzandi Lingyu Wang and Mourad Debbabi. 2017. TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. In NDSS.  Yushun Wang Taous Madi Suryadipta Majumdar Yosr Jarraya Amir Alimohammadifar Makan Pourzandi Lingyu Wang and Mourad Debbabi. 2017. TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. In NDSS.","DOI":"10.14722\/ndss.2017.23365"},{"key":"e_1_3_2_1_26_1","unstructured":"John Whaley. 2003-2007. Java library for manipulating BDDs. http:\/\/javabdd.sourceforge.net\/  John Whaley. 2003-2007. Java library for manipulating BDDs. http:\/\/javabdd.sourceforge.net\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733614"},{"volume-title":"APKeep: Realtime Verification for Real Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","year":"2020","author":"Zhang Peng","key":"e_1_3_2_1_28_1"}],"event":{"name":"APNet '20: 4th Asia-Pacific Workshop on Networking","acronym":"APNet '20","location":"Seoul Republic of Korea"},"container-title":["4th Asia-Pacific Workshop on Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411029.3411031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411029.3411031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:11Z","timestamp":1750195691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411029.3411031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,3]]},"references-count":28,"alternative-id":["10.1145\/3411029.3411031","10.1145\/3411029"],"URL":"https:\/\/doi.org\/10.1145\/3411029.3411031","relation":{},"subject":[],"published":{"date-parts":[[2020,8,3]]},"assertion":[{"value":"2020-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}