Ensuring integrity of network inventory and configuration data | IEEE Conference Publication | IEEE Xplore