{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:44Z","timestamp":1750307984867,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596464"},{"type":"electronic","value":"9783319596471"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59647-1_12","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T02:53:30Z","timestamp":1494644010000},"page":"151-165","source":"Crossref","is-referenced-by-count":2,"title":["Policy Expressions and the Bottom-Up Design of Computing Policies"],"prefix":"10.1007","author":[{"given":"Rezwana","family":"Reaz","sequence":"first","affiliation":[]},{"given":"H. B.","family":"Acharya","sequence":"additional","affiliation":[]},{"given":"Ehab S.","family":"Elmallah","sequence":"additional","affiliation":[]},{"given":"Jorge A.","family":"Cobb","sequence":"additional","affiliation":[]},{"given":"Mohamed G.","family":"Gouda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Acharya, H.B., Gouda, M.G.: Projection and division: linear-space verification of firewalls. In: Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 736\u2013743. IEEE (2010)","DOI":"10.1109\/ICDCS.2010.68"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Acharya, H.B., Joshi, A., Gouda, M.G.: Firewall modules and modular firewalls. In: Proceedings of the 18th IEEE International Conference on Network Protocols (ICNP), pp. 174\u2013182. IEEE (2010)","DOI":"10.1109\/ICNP.2010.5762766"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Acharya, H.B., Kumar, S., Wadhwa, M., Shah, A.: Rules in play: on the complexity of routing tables and firewalls. In: Proceedings of the 24th IEEE International Conference on Network Protocols (ICNP). IEEE (2016)","DOI":"10.1109\/ICNP.2016.7784426"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-09581-3_11","volume-title":"Networked Systems","author":"ES Elmallah","year":"2014","unstructured":"Elmallah, E.S., Gouda, M.G.: Hardness of firewall analysis. In: Noubir, G., Raynal, M. (eds.) NETYS 2014. LNCS, vol. 8593, pp. 153\u2013168. Springer, Cham (2014). doi: 10.1007\/978-3-319-09581-3_11"},{"issue":"4","key":"12_CR5","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. 51(4), 1106\u20131120 (2007)","journal-title":"Comput. Netw."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Hoffman, D., Yoo, K.: Blowtorch: a framework for firewall test automation. In: Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 96\u2013103. ACM (2005)","DOI":"10.1145\/1101908.1101925"},{"issue":"3","key":"12_CR7","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/S0167-4048(03)00310-9","volume":"22","author":"S Kamara","year":"2003","unstructured":"Kamara, S., Fahmy, S., Schultz, E., Kerschbaum, F., Frantzen, M.: Analysis of vulnerabilities in internet firewalls. Comput. Secur. 22(3), 214\u2013232 (2003)","journal-title":"Comput. Secur."},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-46140-3_19","volume-title":"Networked Systems","author":"A Khoumsi","year":"2016","unstructured":"Khoumsi, A., Erradi, M., Ayache, M., Krombi, W.: An approach to resolve NP-hard problems of firewalls. In: Abdulla, P.A., Delporte-Gallet, C. (eds.) NETYS 2016. LNCS, vol. 9944, pp. 229\u2013243. Springer, Cham (2016). doi: 10.1007\/978-3-319-46140-3_19"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-17040-4_14","volume-title":"Foundations and Practice of Security","author":"A Khoumsi","year":"2015","unstructured":"Khoumsi, A., Krombi, W., Erradi, M.: A formal approach to verify completeness and detect anomalies in firewall security policies. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P.W.L. (eds.) FPS 2014. LNCS, vol. 8930, pp. 221\u2013236. Springer, Cham (2015). doi: 10.1007\/978-3-319-17040-4_14"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Krombi, W., Erradi, M., Khoumsi, A.: Automata-based approach to design and analyze security policies. In: Proceedings of the 12th Annual International Conference on Privacy, Security and Trust (PST), pp. 306\u2013313. IEEE (2014)","DOI":"10.1109\/PST.2014.6890953"},{"issue":"9","key":"12_CR11","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/TPDS.2007.70802","volume":"19","author":"AX Liu","year":"2008","unstructured":"Liu, A.X., Gouda, M.G.: Diverse firewall design. IEEE Trans. Parallel Distrib. Syst. (TPDS) 19(9), 1237\u20131251 (2008)","journal-title":"IEEE Trans. Parallel Distrib. Syst. (TPDS)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Fang: a firewall analysis engine. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 177\u2013187. IEEE (2000)","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"12_CR13","unstructured":"Reaz, R., Acharya, H.B., Elmallah, E.S., Cobb, J.A., Gouda, M.G.: Policy expressions and the bottom-up design of computing policies. Technical report No. TR-17-01, Department of Computer Science, The Universisty of Texas at Austin (2017). https:\/\/apps.cs.utexas.edu\/apps\/tech-reports"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-21741-3_8","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"R Reaz","year":"2015","unstructured":"Reaz, R., Ali, M., Gouda, M.G., Heule, M.J.H., Elmallah, E.S.: The Implication Problem of Computing Policies. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 109\u2013123. Springer, Cham (2015). doi: 10.1007\/978-3-319-21741-3_8"},{"issue":"6","key":"12_CR15","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A Wool","year":"2004","unstructured":"Wool, A.: A quantitative study of firewall configuration errors. Computer 37(6), 62\u201367 (2004)","journal-title":"Computer"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, S., Mahmoud, A., Malik, S., Narain, S.: Verification and synthesis of firewalls using SAT and QBF. In: Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP), pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/ICNP.2012.6459944"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59647-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:09Z","timestamp":1750259169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59647-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596464","9783319596471"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59647-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}