Real-Time Verification of Network Properties Using Atomic Predicates
暂无分享,去创建一个
[1] Mohamed G. Gouda,et al. Verification of Distributed Firewalls , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[2] Mohamed G. Gouda,et al. Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[3] George Varghese,et al. Header Space Analysis: Static Checking for Networks , 2012, NSDI.
[4] George Varghese,et al. Real Time Network Policy Checking Using Header Space Analysis , 2013, NSDI.
[5] David A. Maltz,et al. Towards Systematic Design of Enterprise Networks , 2008, IEEE/ACM Transactions on Networking.
[6] Brian Zill,et al. Constructing optimal IP routing tables , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[7] Pankaj Gupta,et al. Algorithms for routing lookups and packet classification , 2000 .
[8] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[9] Albert G. Greenberg,et al. On static reachability analysis of IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] Samuel T. King,et al. Debugging the data plane with anteater , 2011, SIGCOMM 2011.
[11] Ehab Al-Shaer,et al. Network configuration in a box: towards end-to-end verification of network reachability and security , 2009, 2009 17th IEEE International Conference on Network Protocols.
[12] Hongkun Yang,et al. Real-time verification of network properties using Atomic Predicates , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[13] Alex X. Liu,et al. Quantifying and Querying Network Reachability , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[14] Archana Ganapathi,et al. Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.
[15] Ehab Al-Shaer,et al. FlowChecker: configuration analysis and verification of federated openflow infrastructures , 2010, SafeConfig '10.
[16] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[17] Eric Gregory Wen Wie Wong,et al. Validating Network Security Policies via Static Analysis of Router ACL Configuration , 2006 .
[18] E. Allen Emerson,et al. Temporal and Modal Logic , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.