{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:18:45Z","timestamp":1752283125411,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3441988","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:42Z","timestamp":1619154582000},"page":"1138-1146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["VeriNeS"],"prefix":"10.1145","author":[{"given":"Moubarak","family":"Zoure","sequence":"first","affiliation":[{"name":"Univ. Bordeaux, Talence, France"}]},{"given":"Toufik","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Univ. Bordeaux, Talence, France"}]},{"given":"Laurent","family":"R\u00e9veill\u00e8re","sequence":"additional","affiliation":[{"name":"Univ. Bordeaux, Talence, France"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"unstructured":"[n.d.]. CERT Definition of 'Insider Threat' - Updated. https:\/\/insights.sei.cmu.edu\/insider-threat\/2017\/03\/cert-definition-of-insider-threat-updated.html","key":"e_1_3_2_1_1_1"},{"unstructured":"[n.d.]. CVE-2013-6428. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013-6428\/","key":"e_1_3_2_1_2_1"},{"unstructured":"[n.d.]. CVE-2015-7546. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7546\/","key":"e_1_3_2_1_3_1"},{"unstructured":"[n.d.]. NVD - CVE-2018-14432. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14432\/","key":"e_1_3_2_1_4_1"},{"unstructured":"[n.d.]. Why you should consider networking as a service. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprise-networks\/network-as-service-naas.html","key":"e_1_3_2_1_5_1"},{"unstructured":"2020. Build the future of Open Infrastructure. https:\/\/www.openstack.org\/","key":"e_1_3_2_1_6_1"},{"unstructured":"2020. NetworkX. https:\/\/networkx.github.io\/","key":"e_1_3_2_1_7_1"},{"unstructured":"2020. OSM. https:\/\/osm.etsi.org\/","key":"e_1_3_2_1_8_1"},{"unstructured":"2020. Redis. https:\/\/redis.io\/","key":"e_1_3_2_1_9_1"},{"unstructured":"Cloud Security Alliance. 2019. Top Threats to Cloud Computing-The Egregious 11.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TNET.2019.2895278"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3098822.3098834"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2664243.2664274"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/NETSOFT.2017.8004204"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICCCN.2016.7568576"},{"key":"e_1_3_2_1_16_1","volume-title":"Carlo Sansone, and Mario Vento","author":"Cordella Luigi","year":"2004","unstructured":"Luigi PCordella, Pasquale Foggia, Carlo Sansone, and Mario Vento. 2004. A (sub)graph isomorphism algorithm for matching large graphs. IEEE transactions on pattern analysis and machine intelligence 26, 10 (2004), 1367--1372."},{"volume-title":"Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services.","author":"Costa Paolo","unstructured":"Paolo Costa, Matteo Migliavacca, Peter Pietzuch, and Alexander L Wolf. 2012. NaaS: Network-as-a-Service in the Cloud. In Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSD1 16)","author":"Fayaz Seyed K","year":"2016","unstructured":"Seyed K Fayaz, Tushar Sharma, Ari Fogel, Ratul Mahajan, Todd Millstein, Vyas Sekar, and George Varghese. 2016. Efficient network reachability analysis using a succinct control plane representation. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSD1 16). 217--232."},{"key":"e_1_3_2_1_19_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSD1 14)","author":"Fayazbakhsh Seyed Kaveh","year":"2014","unstructured":"Seyed Kaveh Fayazbakhsh, Luis Chiang, Vyas Sekar, Minlan Yu, and Jeffrey C Mogul. 2014. Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSD1 14). 543--546."},{"key":"e_1_3_2_1_20_1","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSD1 15)","author":"Fogel Ari","year":"2015","unstructured":"Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, and Todd Millstein. 2015. A General Approach to Network Configuration Analysis. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSD1 15). USENIX Association, Oakland, CA, 469--483."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2934872.2934876"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/COMST.2018.2830648"},{"unstructured":"Coollen Graham. 2020. Forecast Analysis: Cloud Consulting and Implementation Services Worldwide. Technical Report G00465495. Gatner. https:\/\/www.gartner.com\/en\/documents\/3981831\/forecast-analysis-cloud-consulting-and-implementation-se","key":"e_1_3_2_1_23_1"},{"volume-title":"Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSD1 12). 113--126.","author":"Kazemian Peyman","unstructured":"Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header space analysis: Static checking for networks. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSD1 12). 113--126.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","volume-title":"Veriflow: Verifying network-wide invariants in real time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSD1 13). 15--27.","author":"Khurshid Ahmed","year":"2013","unstructured":"Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P Brighten Godfrey. 2013. Veriflow: Verifying network-wide invariants in real time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSD1 13). 15--27."},{"key":"e_1_3_2_1_26_1","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSD1 15)","author":"Kim Hyojoon","year":"2015","unstructured":"Hyojoon Kim, Joshua Reich, Arpit Gupta, Muhammad Shahbaz, Nick Feamster, and Russ Clark. 2015. Kinetic: Verifiable dynamic network control. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSD1 15). 59--72."},{"key":"e_1_3_2_1_27_1","volume-title":"Yih-Chun Hu, and Adrian Perrig.","author":"Hyun-Jin Kim Tiffany","year":"2014","unstructured":"Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig. 2014. Lightweight source authentication and path validation. In ACM SIGCOMM Computer Communication Review, Vol. 44. ACM, 271--282."},{"key":"e_1_3_2_1_28_1","volume-title":"Dynamic packet forwarding verification in SDN","author":"Li Qi","year":"2018","unstructured":"Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, and Patrick PC Lee. 2018. Dynamic packet forwarding verification in SDN. IEEE Transactions on Dependable and Secure Computing (2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/INFOCOM.2019.8737393"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/3267339"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/2018436.2018470"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/TIFS.2017.2779444"},{"key":"e_1_3_2_1_33_1","volume-title":"Learning probabilistic dependencies among events for proactive security auditing in clouds. Journal of Computer Security Preprint","author":"Majumdar Suryadipta","year":"2019","unstructured":"Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi. 2019. Learning probabilistic dependencies among events for proactive security auditing in clouds. Journal of Computer Security Preprint (2019), 1--38."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1007\/978-3-030-29962-0_12"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/2079296.2079326"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/MCOM.2019.1800873"},{"key":"e_1_3_2_1_37_1","volume-title":"White Paper","author":"Quittek Jrgen","year":"2014","unstructured":"Jrgen Quittek, P Bauskar, T BenMeriem, A Bennett, and M Besson. 2014. Network functions virtualisation (nfv)-management and orchestration. ETSI NFV ISG, White Paper (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/2377677.2377680"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/ICTC.2015.7354672"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/CNS.2018.8433180"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/CloudCom.2019.00034"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1016\/j.jnca.2019.102419"},{"key":"e_1_3_2_1_43_1","volume-title":"Tenant-Guard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Wang Yushun","year":"2017","unstructured":"Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi. 2017. Tenant-Guard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1016\/j.comnet.2016.09.014"},{"key":"e_1_3_2_1_45_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Yuan Yifei","year":"2018","unstructured":"Yifei Yuan, Sanjay Chandrasekaran, Limin Jia, and Vyas Sekar. 2018. Efficient and correct test scheduling for ensembles of network policies. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 437--452."},{"key":"e_1_3_2_1_46_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Yuan Yifei","year":"2018","unstructured":"Yifei Yuan, Sanjay Chandrasekaran, Limin Jia, and Vyas Sekar. 2018. Efficient and correct test scheduling for ensembles of network policies. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 437--452."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/2660267.2660349"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/2999572.2999605"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1109\/IWQoS.2017.7969150"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC '21","name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event Republic of Korea"},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3441988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:24Z","timestamp":1750195464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441988"}},"subtitle":["runtime verification of outsourced network services orchestration"],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":49,"alternative-id":["10.1145\/3412841.3441988","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3441988","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}