{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:56Z","timestamp":1750221116808,"version":"3.41.0"},"reference-count":137,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T00:00:00Z","timestamp":1551139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011105","name":"European Commission","doi-asserted-by":"publisher","award":["H2020-643964"],"award-info":[{"award-number":["H2020-643964"]}],"id":[{"id":"10.13039\/100011105","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["PTDC\/CCI-INF\/30340\/2017"],"award-info":[{"award-number":["PTDC\/CCI-INF\/30340\/2017"]}]},{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["FNR\/P14\/8149128"],"award-info":[{"award-number":["FNR\/P14\/8149128"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"<jats:p>Software-defined networking (SDN) decouples the control and data planes of traditional networks, logically centralizing the functional properties of the network in the SDN controller. While this centralization brought advantages such as a faster pace of innovation, it also disrupted some of the natural defenses of traditional architectures against different threats. The literature on SDN has mostly been concerned with the functional side, despite some specific works concerning non-functional properties such as security or dependability. Though addressing the latter in an ad-hoc, piecemeal way may work, it will most likely lead to efficiency and effectiveness problems.<\/jats:p>\n          <jats:p>\n            We claim that the enforcement of non-functional properties as a pillar of SDN robustness calls for a systemic approach. We further advocate, for its materialization, the reiteration of the successful formula behind SDN: \u2018logical centralization\u2019. As a general concept, we propose\n            <jats:sc>anchor<\/jats:sc>\n            , a subsystem architecture that promotes the logical centralization of non-functional properties. To show the effectiveness of the concept, we focus on security in this article: we identify the current security gaps in SDNs and we populate the architecture middleware with the appropriate security mechanisms in a global and consistent manner. Essential security mechanisms provided by\n            <jats:sc>anchor<\/jats:sc>\n            include reliable entropy and resilient pseudo-random generators, and protocols for secure registration and association of SDN devices.\n          <\/jats:p>\n          <jats:p>\n            We claim and justify in the article that centralizing such mechanisms is key for their effectiveness by allowing us to define and enforce global policies for those properties; reduce the complexity of controllers and forwarding devices; ensure higher levels of robustness for critical services; foster interoperability of the non-functional property enforcement mechanisms; and promote the security and resilience of the architecture itself. We discuss design and implementation aspects, and we prove and evaluate our algorithms and mechanisms, including the formalisation of the main protocols and the verification of their core security properties using the T\n            <jats:sc>amarin<\/jats:sc>\n            prover.\n          <\/jats:p>","DOI":"10.1145\/3301305","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T15:05:33Z","timestamp":1551193533000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["ANCHOR"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0830-0238","authenticated-orcid":false,"given":"Diego","family":"Kreutz","sequence":"first","affiliation":[{"name":"SnT, University of Luxembourg and Federal University of Pampa, avenue de la Fonte, Esch-sur-AlzetteBrazil, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8006-7392","authenticated-orcid":false,"given":"Jiangshan","family":"Yu","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg and Monash University, Clayton VIC, Australia"}]},{"given":"Fernando M. V.","family":"Ramos","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias, Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"Paulo","family":"Esteves-Verissimo","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg, avenue de la Fonte, Esch-sur-Alzette"}]}],"member":"320","published-online":{"date-parts":[[2019,2,26]]},"reference":[{"volume-title":"2016 IEEE Global Communications Conference (GLOBECOM\u201916)","author":"Abdullaziz O. I.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"volume-title":"Security in software defined networks: A survey","year":"2015","author":"Ahmad Ijaz","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081073"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT","year":"2000","author":"Albrecht Martin R.","key":"e_1_2_1_6_1"},{"volume-title":"2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA\u201917)","author":"Aliyu A. L.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","first-page":"1","article-title":"Comprehensive survey on T-SDN: Software-defined networking for transport networks","volume":"99","author":"Alvizu R.","year":"2017","journal-title":"IEEE Communications Surveys Tutorials PP"},{"volume-title":"Retrieved","year":"2018","key":"e_1_2_1_9_1"},{"volume-title":"Spook in your network: Attacking an SDN with a compromised OpenFlow switch","author":"Antikainen Markku","key":"e_1_2_1_10_1"},{"volume-title":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 37--44","author":"Arbettu R. K.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_2"},{"volume-title":"2017 International Conference on Computing, Networking and Communications (ICNC). IEEE, 167--171","author":"Barrett R.","key":"e_1_2_1_13_1"},{"volume-title":"James F. Dray, and San Vo.","year":"2010","author":"Bassham Lawrence E.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672325"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"volume-title":"Introduction to Post-quantum Cryptography","author":"Bernstein Daniel J.","key":"e_1_2_1_19_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_17"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.39"},{"key":"e_1_2_1_23_1","volume-title":"LIPIcs-Leibniz International Proceedings in Informatics","volume":"71","author":"Bhargavan Karthikeyan","year":"2017"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.37"},{"volume-title":"Retrieved","year":"2015","author":"Bocek Kevin","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2016.12"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041252"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.59"},{"volume-title":"International Conference on Dependable Systems and Networks","year":"2004","author":"Cachin C.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"Casado Martin","year":"2006"},{"volume-title":"1st IEEE Conference on Network Softwarization (NetSoft\u201915)","year":"2015","author":"Chi Po-Wen","key":"e_1_2_1_32_1"},{"volume-title":"10th International Conference on Communication Systems Networks (COMSNETS'18)","author":"Mohan P. M.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876210"},{"volume-title":"Retrieved","year":"2014","key":"e_1_2_1_35_1"},{"volume-title":"Retrieved","year":"2017","author":"Cromwell Bob","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.46"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2014.6860404"},{"volume-title":"Retrieved","year":"2017","author":"DigiCert Inc.","key":"e_1_2_1_39_1"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516653"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632038"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978400"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486003"},{"volume-title":"Cryptography Engineering: Design Principles and Practical Applications","year":"2011","author":"Ferguson Niels","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367387"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592576"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397718.1397732"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987486"},{"volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium (Security\u201912)","author":"Heninger Nadia","key":"e_1_2_1_50_1"},{"volume-title":"Retrieved","year":"2013","author":"Hill Brad","key":"e_1_2_1_51_1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2003.811254"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188913.1188921"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.86"},{"volume-title":"Retrieved","year":"2015","author":"Spectrum IEEE","key":"e_1_2_1_56_1"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809826.2809833"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774996"},{"volume-title":"International Conference on Communication, Computing 8 Systems (ICCCS\u201914)","year":"2014","author":"Kaur Karamjeet","key":"e_1_2_1_60_1"},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Z. K. Khattak M. Awais and A. Iqbal. 2014. Performance evaluation of OpenDaylight SDN controller. In 20th IEEE ICPADS. IEEE 671--676.  Z. K. Khattak M. Awais and A. Iqbal. 2014. Performance evaluation of OpenDaylight SDN controller. In 20th IEEE ICPADS. IEEE 671--676.","DOI":"10.1109\/PADSW.2014.7097868"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516706"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121112.00190"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"volume-title":"Onix: A distributed control platform for large-scale production networks. In OSDI. 351--364.","year":"2010","author":"Koponen Teemu","key":"e_1_2_1_66_1"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2014.14"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.09.014"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"volume-title":"The KISS principle in software-defined networking: An architecture for keeping it simple and secure. ArXiv e-prints (Nov","year":"2017","author":"Kreutz D.","key":"e_1_2_1_71_1"},{"volume-title":"The KISS principle in software-defined networking: A framework for secure communications","year":"2018","author":"Kreutz D.","key":"e_1_2_1_72_1"},{"volume-title":"ANCHOR: Logically-centralized security for software-defined networks. ArXiv e-prints","year":"2017","author":"Kreutz D.","key":"e_1_2_1_73_1"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_2_1_75_1","first-page":"1","article-title":"DELTA: A security assessment framework for software-defined networks","volume":"17","author":"Lee Seungsoo","year":"2017","journal-title":"Proceedings of NDSS"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.011"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.004"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"volume-title":"2015 20th International Conference on Control Systems and Computer Science. 185--190","author":"Mahu D.","key":"e_1_2_1_79_1"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.osn.2015.03.005"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2013.6663000"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281254"},{"volume-title":"Retrieved","year":"2017","author":"MEF.","key":"e_1_2_1_83_1"},{"volume-title":"CAV 2013","year":"2013","author":"Meier Simon","key":"e_1_2_1_84_1"},{"volume-title":"Retrieved","year":"2016","author":"Mimoso Michael","key":"e_1_2_1_85_1"},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_86_1"},{"volume-title":"HTTPS. In Proceedings of the 10th ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT\u201914)","year":"2014","author":"Naylor David","key":"e_1_2_1_87_1"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"volume-title":"Retrieved","year":"2017","author":"NIST.","key":"e_1_2_1_89_1"},{"volume-title":"Retrieved","year":"2017","author":"ONF.","key":"e_1_2_1_90_1"},{"volume-title":"Retrieved","year":"2018","author":"Project OpenDaylight","key":"e_1_2_1_91_1"},{"volume-title":"Retrieved","year":"2016","key":"e_1_2_1_92_1"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/24592.24594"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.013"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_2_1_96_1","unstructured":"Pica8 Inc.2018. Pica8. Retrieved January 24 2019 from https:\/\/www.pica8.com\/.  Pica8 Inc.2018. Pica8. Retrieved January 24 2019 from https:\/\/www.pica8.com\/."},{"volume-title":"Retrieved","year":"2018","author":"Networking Open","key":"e_1_2_1_97_1"},{"volume-title":"Retrieved","year":"2018","author":"Ponemon Institute Research.","key":"e_1_2_1_98_1"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"volume-title":"Securing the software defined network control layer","author":"Porras Phillip A.","key":"e_1_2_1_100_1"},{"volume-title":"Retrieved","year":"2019","key":"e_1_2_1_101_1"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486022"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"key":"e_1_2_1_104_1","unstructured":"Red Hat Inc.2018. OpenShift SDN. Retrieved January 24 2019 from https:\/\/docs.openshift.com\/container-platform\/3.7\/architecture\/networking\/sdn.html.  Red Hat Inc.2018. OpenShift SDN. Retrieved January 24 2019 from https:\/\/docs.openshift.com\/container-platform\/3.7\/architecture\/networking\/sdn.html."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620752"},{"volume-title":"Retrieved","year":"2018","author":"Framework Community Ryu SDN","key":"e_1_2_1_106_1"},{"key":"e_1_2_1_107_1","first-page":"39","article-title":"Secure communication between OpenFlow switches and controllers","volume":"2015","author":"Samociuk Dominik","year":"2015","journal-title":"AFIN"},{"volume-title":"Retrieved","year":"2012","author":"Schneier Bruce","key":"e_1_2_1_108_1"},{"volume-title":"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World","author":"Schneier Bruce","key":"e_1_2_1_109_1"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"volume-title":"Retrieved","year":"2017","author":"Secci Stefano","key":"e_1_2_1_112_1"},{"volume-title":"Retrieved","year":"2019","author":"Sheffer Y.","key":"e_1_2_1_113_1"},{"volume-title":"FRESCO: Modular composable security services for software-defined networks","year":"2013","author":"Shin Seugwon","key":"e_1_2_1_114_1"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217951"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987480"},{"volume-title":"Retrieved","year":"2017","author":"Stark Philip B.","key":"e_1_2_1_118_1"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"volume-title":"Retrieved","year":"2018","author":"The","key":"e_1_2_1_120_1"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.47"},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_122_1"},{"volume-title":"Retrieved","year":"2018","author":"Inc.","key":"e_1_2_1_123_1"},{"volume-title":"A framework and comparative analysis of control plane security of SDN and conventional networks. ArXiv e-prints (March","year":"2017","author":"Wan T.","key":"e_1_2_1_124_1"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912609"},{"volume-title":"8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud\u201916)","year":"2016","author":"Williams Dan","key":"e_1_2_1_126_1"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775012"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_17"},{"key":"e_1_2_1_129_1","first-page":"140","article-title":"Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack","volume":"2014","author":"Yarom Yuval","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2748159"},{"volume-title":"DECIM: Detecting Endpoint Compromise in Messaging. Cryptology ePrint Archive, Report 2015\/486","year":"2017","author":"Yu Jiangshan","key":"e_1_2_1_131_1"},{"key":"e_1_2_1_132_1","first-page":"1","article-title":"DECIM: Detecting endpoint compromise in messaging","volume":"13","author":"Yu Jiangshan","year":"2017","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26096-9_17"},{"volume-title":"Retrieved","year":"2015","author":"Zetter Kim","key":"e_1_2_1_134_1"},{"volume-title":"2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN\u201915)","author":"Zhao Y.","key":"e_1_2_1_135_1"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:04Z","timestamp":1750208524000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301305"}},"subtitle":["Logically Centralized Security for Software-Defined Networks"],"short-title":[],"issued":{"date-parts":[[2019,2,26]]},"references-count":137,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5,31]]}},"alternative-id":["10.1145\/3301305"],"URL":"https:\/\/doi.org\/10.1145\/3301305","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2019,2,26]]},"assertion":[{"value":"2017-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}