{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:00:53Z","timestamp":1769014853676,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"NWO"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,23]]},"DOI":"10.1145\/3472951.3473506","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:42:36Z","timestamp":1627695756000},"page":"8-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Increasing the Transparency, Accountability and Controllability of multi-domain networks with the UPIN framework"],"prefix":"10.1145","author":[{"given":"Rodrigo","family":"Bazo","sequence":"first","affiliation":[{"name":"University of Twente"}]},{"given":"Leonardo","family":"Boldrini","sequence":"additional","affiliation":[{"name":"University of Amsterdam"}]},{"given":"Cristian","family":"Hesselman","sequence":"additional","affiliation":[{"name":"SIDN Labs and University of Twente"}]},{"given":"Paola","family":"Grosso","sequence":"additional","affiliation":[{"name":"University of Amsterdam"}]}],"member":"320","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656889"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.136"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35764-0_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276799.3276801"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409796"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"e_1_3_2_1_9_1","unstructured":"Justyna Joanna Chromik. 2019. Process-aware SCADA traffic monitoring: A local approach. (2019).  Justyna Joanna Chromik. 2019. Process-aware SCADA traffic monitoring: A local approach. (2019)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417124"},{"key":"e_1_3_2_1_11_1","volume-title":"Publish in: Feburary","author":"European Union Agency for Cybersecurity. [n.","year":"2021","unstructured":"European Union Agency for Cybersecurity. [n. d.]. Securing EU's Vision on 5G: Cybersecurity Certification. ([n. d.]). https:\/\/www.enisa.europa.eu\/news\/enisanews\/securing_eu_vision_on_5g_cybersecurity_certification , Publish in: Feburary 2021 , Accessed in: May 2021. European Union Agency for Cybersecurity. [n. d.]. Securing EU's Vision on 5G: Cybersecurity Certification. ([n. d.]). https:\/\/www.enisa.europa.eu\/news\/enisanews\/securing_eu_vision_on_5g_cybersecurity_certification, Publish in: Feburary 2021, Accessed in: May 2021."},{"key":"e_1_3_2_1_12_1","volume-title":"2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM2021)","author":"Grosso Paola","unstructured":"Paola Grosso , Cristian Hesselman , Luuk Hendriks , Joseph Hill , Stavros Konstantras , Ronald van der Pol, Victor Reijs, Joeri de Ruiter, and Caspar Schutijser. 2021. A national programmable infrastructure to experiment with next-generation networks . In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM2021) . Accepted. Paola Grosso, Cristian Hesselman, Luuk Hendriks, Joseph Hill, Stavros Konstantras, Ronald van der Pol, Victor Reijs, Joeri de Ruiter, and Caspar Schutijser. 2021. A national programmable infrastructure to experiment with next-generation networks. In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM2021). Accepted."},{"key":"e_1_3_2_1_13_1","volume-title":"Published in: April","author":"Guardian The","year":"2021","unstructured":"The Guardian . [n. d.]. Huawei 'may have eavesdropped on Dutch mobile network's calls'. ([n. d.]). https:\/\/www.theguardian.com\/technology\/2021\/apr\/19\/huawei-may-have-eavesdropped-on-dutch-mobile-networks-calls , Published in: April 2021 , Accessed in: May 2021. The Guardian. [n. d.]. Huawei 'may have eavesdropped on Dutch mobile network's calls'. ([n. d.]). https:\/\/www.theguardian.com\/technology\/2021\/apr\/19\/huawei-may-have-eavesdropped-on-dutch-mobile-networks-calls, Published in: April 2021, Accessed in: May 2021."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09564-7"},{"key":"e_1_3_2_1_15_1","volume-title":"Published in: November","author":"Labs SIDN","year":"2020","unstructured":"SIDN Labs . [n.d.]. Analysing vulnerabilities in the network infrastructure. ([n. d.]). https:\/\/www.sidnlabs.nl\/en\/news-and-blogs\/analysing-vulnerabilities-in-the-network-infrastructure , Published in: November 2020 , Accessed in: May 2021. SIDN Labs. [n.d.]. Analysing vulnerabilities in the network infrastructure. ([n. d.]). https:\/\/www.sidnlabs.nl\/en\/news-and-blogs\/analysing-vulnerabilities-in-the-network-infrastructure, Published in: November 2020, Accessed in: May 2021."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510711"},{"key":"e_1_3_2_1_17_1","volume-title":"Published in: September","author":"National Institute of Standards and Technology. [n.","year":"2014","unstructured":"National Institute of Standards and Technology. [n. d.]. Guidelines for Smart Grid Cybersecurity. ([n. d.]). https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/7628\/rev-1\/final (Appendix E, use-case 24) , Published in: September 2014 , Accessed in: May 2021. National Institute of Standards and Technology. [n. d.]. Guidelines for Smart Grid Cybersecurity. ([n. d.]). https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/7628\/rev-1\/final (Appendix E, use-case 24), Published in: September 2014, Accessed in: May 2021."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172924"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN51074.2021.9385527"},{"key":"e_1_3_2_1_20_1","volume-title":"Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. arXiv preprint arXiv:2104.02346","author":"Scherrer Simon","year":"2021","unstructured":"Simon Scherrer , Markus Legner , Adrian Perrig , and Stefan Schmid . 2021. Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. arXiv preprint arXiv:2104.02346 ( 2021 ). Simon Scherrer, Markus Legner, Adrian Perrig, and Stefan Schmid. 2021. Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. arXiv preprint arXiv:2104.02346 (2021)."},{"key":"e_1_3_2_1_21_1","volume-title":"Huawei in 5G Rollout. ([n. d.]). https:\/\/www.nytimes.com\/2020\/01\/29\/world\/europe\/euhuawei-5g.html, Published in: January","author":"Times New York","year":"2020","unstructured":"New York Times . [n. d.]. E.U. Recommends Limiting, but Not Banning , Huawei in 5G Rollout. ([n. d.]). https:\/\/www.nytimes.com\/2020\/01\/29\/world\/europe\/euhuawei-5g.html, Published in: January 2020 , Accessed in: May 2021. New York Times. [n. d.]. E.U. Recommends Limiting, but Not Banning, Huawei in 5G Rollout. ([n. d.]). https:\/\/www.nytimes.com\/2020\/01\/29\/world\/europe\/euhuawei-5g.html, Published in: January 2020, Accessed in: May 2021."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374784"},{"key":"e_1_3_2_1_23_1","volume-title":"Prefers Hacking Routers and Switches. ([n. d.]). https:\/\/www.wired.com\/2013\/09\/nsa-router-hacking\/, Acessed in: May","year":"2021","unstructured":"Wired. [n. d.]. NSA Laughs at PCs , Prefers Hacking Routers and Switches. ([n. d.]). https:\/\/www.wired.com\/2013\/09\/nsa-router-hacking\/, Acessed in: May 2021 . Wired. [n. d.]. NSA Laughs at PCs, Prefers Hacking Routers and Switches. ([n. d.]). https:\/\/www.wired.com\/2013\/09\/nsa-router-hacking\/, Acessed in: May 2021."}],"event":{"name":"SIGCOMM '21: ACM SIGCOMM 2021 Conference","location":"Virtual Event USA","acronym":"SIGCOMM '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472951.3473506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472951.3473506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:57Z","timestamp":1750191117000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472951.3473506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":23,"alternative-id":["10.1145\/3472951.3473506","10.1145\/3472951"],"URL":"https:\/\/doi.org\/10.1145\/3472951.3473506","relation":{},"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"2021-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}