메뉴 건너뛰기




Volumn , Issue , 2010, Pages 37-44

FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures

Author keywords

access control; automated analysis; binary decision diagrams; configuration verification; openflow

Indexed keywords

AUTOMATED ANALYSIS; BINARY DECISION; CONFIGURATION ANALYSIS; CONFIGURATION VERIFICATION; CONNECTED NETWORKS; MISCONFIGURATIONS; MODEL CHECKER; MULTIPLE USER; OPENFLOW; REAL NETWORKS; WRITING RULES;

EID: 78650109005     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866898.1866905     Document Type: Conference Paper
Times cited : (224)

References (20)
  • 2
    • 27644451689 scopus 로고    scopus 로고
    • Conflict classification and analysis of distributed firewall policies
    • October Nominated for Best JSAC Paper Award for year 2005
    • E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC), 23(10), October 2005. Nominated for Best JSAC Paper Award for year 2005.
    • (2005) IEEE Journal on Selected Areas in Communications (JSAC) , vol.23 , Issue.10
    • Al-Shaer, E.1    Hamed, H.2    Boutaba, R.3    Hasan, M.4
  • 4
    • 8344229907 scopus 로고    scopus 로고
    • Discovery of policy anomalies in distributed firewalls
    • E. S. Al-shaer and H. H. Hamed. Discovery of policy anomalies in distributed firewalls. In In IEEE INFOCOM '04, pages 2605-2616, 2004.
    • (2004) In IEEE INFOCOM '04 , pp. 2605-2616
    • Al-shaer, E.S.1    Hamed, H.H.2
  • 5
    • 65249107656 scopus 로고    scopus 로고
    • Shadow configuration as a network management primitive
    • R. Alimi, Y. Wang, and Y. R. Yang. Shadow configuration as a network management primitive. SIGCOMM Comput. Commun. Rev., 38(4):111-122, 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.4 , pp. 111-122
    • Alimi, R.1    Wang, Y.2    Yang, Y.R.3
  • 6
    • 0022769976 scopus 로고
    • Graph-based algorithms for Boolean function manipulation
    • August
    • R. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, August 1986.
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.1
  • 8
    • 0041474573 scopus 로고    scopus 로고
    • Integrity for virtual private routed networks
    • R. Bush and T. G. Griffin. Integrity for virtual private routed networks. In IEEE INFOCOM 2003, volume 2, pages 1467-1476, 2003.
    • (2003) IEEE INFOCOM 2003 , vol.2 , pp. 1467-1476
    • Bush, R.1    Griffin, T.G.2
  • 9
    • 0001449325 scopus 로고
    • Temporal and modal logic
    • J. van Leeuwen, editor, chapter 16, MIT Press
    • E. A. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. MIT Press, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 995-1072
    • Emerson, E.A.1
  • 10
    • 84894553762 scopus 로고    scopus 로고
    • Detecting BGP configuration faults with static analysis
    • N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, 2005.
    • (2005) NSDI
    • Feamster, N.1    Balakrishnan, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.