2022
DOI: 10.1109/tdsc.2020.2974727
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Policy-Defined Networking Using Metagraphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
13
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(14 citation statements)
references
References 34 publications
1
13
0
Order By: Relevance
“…Reachability between the source and target sets in a metagraph is defined by the existence of (valid) metapaths between the two. Additionally, metapaths have a dominance property which can be used to determine redundant components (edges or elements) [15]. Once identified, those components can be safely removed from the policies.…”
Section: From Graphs To Metagraphsmentioning
confidence: 99%
See 4 more Smart Citations
“…Reachability between the source and target sets in a metagraph is defined by the existence of (valid) metapaths between the two. Additionally, metapaths have a dominance property which can be used to determine redundant components (edges or elements) [15]. Once identified, those components can be safely removed from the policies.…”
Section: From Graphs To Metagraphsmentioning
confidence: 99%
“…We use its formal foundations to verify whether the actual deployment of a policy (i.e., its implementation) matches its initial specification. We rely on this structure since, by design, it provides means to locate conflicts and avoid redundancy [15]. Metagraphs provide more fine-grained verification process than with other structures like usual graphs.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations