{"id":"https://openalex.org/W2114510630","doi":"https://doi.org/10.1145/1882486.1882502","title":"OASis","display_name":"OASis","publication_year":2009,"publication_date":"2009-10-19","ids":{"openalex":"https://openalex.org/W2114510630","doi":"https://doi.org/10.1145/1882486.1882502","mag":"2114510630"},"language":"en","primary_location":{"id":"doi:10.1145/1882486.1882502","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1882486.1882502","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102057328","display_name":"Yaxuan Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaxuan Qi","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042735025","display_name":"Fei He","orcid":"https://orcid.org/0000-0002-4266-875X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei He","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010417454","display_name":"Xiang Wang","orcid":"https://orcid.org/0000-0002-5262-0557"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Wang","raw_affiliation_strings":["University of Science and Technology of China, Hefei, China",", University of Science and Technology of China, Hefei, China#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":", University of Science and Technology of China, Hefei, China#TAB#","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101543871","display_name":"Xinming Chen","orcid":"https://orcid.org/0000-0003-3212-7172"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinming Chen","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109879581","display_name":"Yibo Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yibo Xue","raw_affiliation_strings":["Tsinghua National Lab for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua National Lab for Information Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100361665","display_name":"Jun Li","orcid":"https://orcid.org/0000-0001-7344-3070"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Li","raw_affiliation_strings":["Tsinghua National Lab for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua National Lab for Information Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102057328"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13132708,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"66","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.955413818359375},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8172270059585571},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7931519746780396},{"id":"https://openalex.org/keywords/packet-processing","display_name":"Packet processing","score":0.7433066368103027},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5218561887741089},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.4778729975223541},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45770666003227234},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4566373825073242},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4538915157318115},{"id":"https://openalex.org/keywords/extensibility","display_name":"Extensibility","score":0.4517214000225067},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.45088258385658264},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.4497596025466919},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4452633261680603},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.418994277715683},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.41758087277412415},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.41655927896499634},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.4148525595664978},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3774976432323456},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.247442364692688}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.955413818359375},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8172270059585571},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7931519746780396},{"id":"https://openalex.org/C2779581428","wikidata":"https://www.wikidata.org/wiki/Q7122997","display_name":"Packet processing","level":3,"score":0.7433066368103027},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5218561887741089},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.4778729975223541},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45770666003227234},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4566373825073242},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4538915157318115},{"id":"https://openalex.org/C32833848","wikidata":"https://www.wikidata.org/wiki/Q4115054","display_name":"Extensibility","level":2,"score":0.4517214000225067},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.45088258385658264},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.4497596025466919},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4452633261680603},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.418994277715683},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.41758087277412415},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.41655927896499634},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.4148525595664978},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3774976432323456},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.247442364692688},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1882486.1882502","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1882486.1882502","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3668469735","display_name":null,"funder_award_id":"2007AA01Z468Intel University Program","funder_id":"https://openalex.org/F4320321540","funder_display_name":"Ministry of Science and Technology of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321540","display_name":"Ministry of Science and Technology of the People's Republic of China","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2105947495","https://openalex.org/W2150702922","https://openalex.org/W2155854936"],"related_works":["https://openalex.org/W2361515550","https://openalex.org/W2495628081","https://openalex.org/W2583381754","https://openalex.org/W4310291187","https://openalex.org/W2144255176","https://openalex.org/W2592819086","https://openalex.org/W2891274976","https://openalex.org/W2393767664","https://openalex.org/W4240856555","https://openalex.org/W2046094884"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"propose":[4],"an":[5,68],"extensible":[6],"Open-Architecture":[7],"Services":[8],"platform":[9],"(OASis)":[10],"for":[11,38,47,55,63],"high-performance":[12],"network":[13,31,48,85],"processing.":[14],"OASis":[15],"embraces":[16],"recent":[17],"advances":[18],"of":[19,71],"open":[20,23,26,30],"technologies,":[21],"including":[22,88],"source":[24],"software,":[25],"system":[27,65],"standards":[28],"and":[29,58,93,114],"architectures.":[32],"Three":[33],"programming":[34,53],"models":[35],"are":[36],"proposed":[37],"target-specific":[39],"processing":[40,45],"modules:":[41],"a":[42,50,59,73,118],"multi-granularity":[43],"packet":[44],"model":[46,54,62],"processing;":[49,57],"thread-isolated":[51],"parallel":[52],"service":[56],"message-based":[60],"management":[61],"centralized":[64],"administration.":[66],"As":[67],"application":[69],"example":[70],"OASis,":[72],"Unified":[74],"Threat":[75],"Management":[76],"(UTM)":[77],"prototype":[78,82,102],"is":[79],"implemented.":[80],"This":[81],"provides":[83],"multiple":[84],"security":[86],"services,":[87],"stateful":[89,106],"firewall,":[90],"intrusion":[91,112],"detection,":[92],"virus":[94],"scanning.":[95],"Experimental":[96],"results":[97],"show":[98],"that,":[99],"the":[100],"OASis-UTM":[101],"can":[103],"achieve":[104],"40Gbps":[105],"firewall":[107],"performance":[108,116],"together":[109],"with":[110],"4--8Gbps":[111],"detection":[113],"anti-virus":[115],"on":[117],"12U":[119],"14-slot":[120],"ATCA":[121],"platform.":[122]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
