{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:53:53Z","timestamp":1757613233203,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5,20]]},"DOI":"10.23919\/ifipnetworking.2019.8816830","type":"proceedings-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T21:35:56Z","timestamp":1567114556000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Property Enforcement in Programmable Data Planes"],"prefix":"10.23919","author":[{"given":"Miguel","family":"Neves","sequence":"first","affiliation":[{"name":"UFRGS"}]},{"given":"Bradley","family":"Huffaker","sequence":"additional","affiliation":[{"name":"CAIDA\/UCSD"}]},{"given":"Kirill","family":"Levchenko","sequence":"additional","affiliation":[{"name":"UIUC"}]},{"given":"Marinho","family":"Barcellos","sequence":"additional","affiliation":[{"name":"UFRGS"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098833"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050234"},{"key":"ref12","first-page":"103","article-title":"Compiling packet programs to reconfigurable switches","author":"jose","year":"2015","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref13","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI'08)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143380"},{"key":"ref15","first-page":"217","article-title":"Efficient network reachability analysis using a succinct control plane representation","author":"fayaz","year":"2016","journal-title":"12th USENIX Symp Operating Systems Design and Implementation (OSDI 16)"},{"key":"ref16","first-page":"15","article-title":"Verifiow: Verifying network-wide invariants in real time","author":"khurshid","year":"2013","journal-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"ref3","first-page":"35","article-title":"Netchain: Scale-free sub-rtt coordination","author":"jin","year":"2018","journal-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281421"},{"journal-title":"Automatically verifying reachability and well-formedness in p4 networks","year":"2016","author":"lopes","key":"ref8"},{"key":"ref7","first-page":"499","article-title":"Checking beliefs in dynamic networks","author":"lopes","year":"2015","journal-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"ref20","first-page":"467","article-title":"Stroboscope: Declarative network monitoring on a budget","author":"tilmans","year":"2018","journal-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref22","first-page":"543","article-title":"Enforcing network-wide policies in the presence of dynamic middlebox actions using fiowtags","author":"fayazbakhsh","year":"2014","journal-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21236\/AD0772806"}],"event":{"name":"2019 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2019,5,20]]},"location":"Warsaw, Poland","end":{"date-parts":[[2019,5,22]]}},"container-title":["2019 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811689\/8816828\/08816830.pdf?arnumber=8816830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:19:56Z","timestamp":1757009996000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8816830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,20]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2019.8816830","relation":{},"subject":[],"published":{"date-parts":[[2019,5,20]]}}}