Increasingly, network operators do not directly operate computerson their network, yet are responsible for assessingnetwork vulnerabilities to ensure compliance with policiesabout information disclosure, and tracking services that affectprovisioning. Thus, with decentralized network management,