License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.5.2.44
URN: urn:nbn:de:0030-drops-50440
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2015/5044/
Go back to Dagstuhl Reports


Bjorner, Nikolaj ; Foster, Nate ; Godfrey, Philip Brighten ; Zave, Pamela
Weitere Beteiligte (Hrsg. etc.): Nikolaj Bjorner and Nate Foster and Philip Brighten Godfrey and Pamela Zave

Formal Foundations for Networking (Dagstuhl Seminar 15071)

pdf-format:
dagrep_v005_i002_p044_s15071.pdf (1.0 MB)


Abstract

This report documents the program and outcomes of Dagstuhl Seminar 15071 "Formal Foundations for Networking." Networking is in the midst of a revolution being driven by rapidly expanding infrastructures and emerging software-defined networking architectures. There is a growing need for tools and methodologies that provide rigorous guarantees about performance, reliability, and security. This seminar brought together leading researchers and practitioners from the fields of formal methods, networking, programming languages, and security, to investigate the task of developing formal foundations for networks.

BibTeX - Entry

@Article{bjorner_et_al:DR:2015:5044,
  author =	{Nikolaj Bjorner and Nate Foster and Philip Brighten Godfrey and Pamela Zave},
  title =	{{Formal Foundations for Networking (Dagstuhl Seminar 15071)}},
  pages =	{44--63},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2015},
  volume =	{5},
  number =	{2},
  editor =	{Nikolaj Bjorner and Nate Foster and Philip Brighten Godfrey and Pamela Zave},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2015/5044},
  URN =		{urn:nbn:de:0030-drops-50440},
  doi =		{10.4230/DagRep.5.2.44},
  annote =	{Keywords: Formal methods, logic, middleboxes, model checking, networking, program synthesis, security, software-defined networking, verification}
}

Keywords: Formal methods, logic, middleboxes, model checking, networking, program synthesis, security, software-defined networking, verification
Collection: Dagstuhl Reports, Volume 5, Issue 2
Issue Date: 2015
Date of publication: 15.07.2015


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI