1. R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in Proc. SIGMOD (2003), pp. 86–97
2. E. Al-Shaer, W. Marrero, A. El-Atawy, K. ElBadawi, Network configuration in a box: towards end-to-end verification of network reachability and security, in Proc. ICNP (2009), pp. 123–132
3. S. Bandhakavi, S. Bhatt, C. Okita, P. Rao, Analyzing end-to-end network reachability, in Proceedings of IFIP/IEEE International Conference on Symposium on Integrated Network Management (2009), pp. 585–590
4. T. Benson, A. Akella, D. Maltz, Unraveling the complexity of network management, in Proc. NSDI (2009), pp. 335–348
5. M. Casado, T. Garfinkel, A. Akella, M.J. Freedman, D. Boneh, N. McKeown, S. Shenker, Sane: a protection architecture for enterprise networks, in Proc. Usenix Security Symposium (2006), pp. 137–151