{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T15:40:08Z","timestamp":1751816408523,"version":"3.41.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T00:00:00Z","timestamp":1535155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T00:00:00Z","timestamp":1535155200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1440035"],"award-info":[{"award-number":["1440035"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s00607-018-0655-0","type":"journal-article","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T12:43:06Z","timestamp":1535200986000},"page":"1307-1326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Policy expressions and the bottom-up design of computing policies"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2219-0987","authenticated-orcid":false,"given":"Rezwana","family":"Reaz","sequence":"first","affiliation":[]},{"given":"H. B.","family":"Acharya","sequence":"additional","affiliation":[]},{"given":"Ehab S.","family":"Elmallah","sequence":"additional","affiliation":[]},{"given":"Jorge A.","family":"Cobb","sequence":"additional","affiliation":[]},{"given":"Mohamed G.","family":"Gouda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,25]]},"reference":[{"key":"655_CR1","doi-asserted-by":"crossref","unstructured":"Acharya HB, Joshi A, Gouda MG (2010) Firewall modules and modular firewalls. In: Proceedings of the 18th IEEE international conference on network protocols (ICNP). IEEE, pp 174\u2013182","DOI":"10.1109\/ICNP.2010.5762766"},{"key":"655_CR2","doi-asserted-by":"crossref","unstructured":"Acharya HB, Kumar S, Wadhwa M, Shah A (2016) Rules in play: on the complexity of routing tables and firewalls. In: Proceedings of the 24th IEEE international conference on network protocols (ICNP). IEEE","DOI":"10.1109\/ICNP.2016.7784426"},{"key":"655_CR3","unstructured":"Elmallah ES, Gouda MG (2014) Hardness of firewall analysis. In: Proceedings of the 2nd international conference on NETworked sYStems (NETYS), Lecture Notes in Computer Science, vol 8593. Springer, pp. 153\u2013168"},{"issue":"4","key":"655_CR4","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda MG, Liu AX (2007) Structured firewall design. Comput Netw 51(4):1106\u20131120","journal-title":"Comput Netw"},{"key":"655_CR5","doi-asserted-by":"crossref","unstructured":"Heule MJ, Reaz R, Acharya HB, Gouda MG (2016) Analysis of computing policies using sat solvers (short paper). In: Proceedings of the 18th international symposium on stabilization, safety, and security of distributed systems. Springer, pp 190\u2013194","DOI":"10.1007\/978-3-319-49259-9_16"},{"key":"655_CR6","doi-asserted-by":"crossref","unstructured":"Hoffman D, Yoo K (2005) Blowtorch: a framework for firewall test automation. In: Proceedings of the 20th IEEE\/ACM international conference on automated software engineering (ASE). ACM, pp 96\u2013103","DOI":"10.1145\/1101908.1101925"},{"issue":"3","key":"655_CR7","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/S0167-4048(03)00310-9","volume":"22","author":"S Kamara","year":"2003","unstructured":"Kamara S, Fahmy S, Schultz E, Kerschbaum F, Frantzen M (2003) Analysis of vulnerabilities in internet firewalls. Comput Secur 22(3):214\u2013232","journal-title":"Comput Secur"},{"key":"655_CR8","doi-asserted-by":"crossref","unstructured":"Khoumsi A, Erradi M, Ayache M, Krombi W (2016) An approach to resolve np-hard problems of firewalls. In: Proceedings of the 4th international conference on NETworked sYStems (NETYS). Springer","DOI":"10.1007\/978-3-319-46140-3_19"},{"issue":"1","key":"655_CR9","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.jksuci.2016.11.008","volume":"30","author":"A Khoumsi","year":"2016","unstructured":"Khoumsi A, Erradi M, Krombi W (2016) A formal basis for the design and analysis of firewall security policies. J King Saud Univ Comput Inf Sci 30(1):51\u201366","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"655_CR10","unstructured":"Khoumsi A, Krombi W, Erradi M (2014) A formal approach to verify completeness and detect anomalies in firewall security policies. In: Proceedings of the 7th international symposium on foundations and practice of security. Springer, pp 221\u2013236"},{"key":"655_CR11","doi-asserted-by":"crossref","unstructured":"Krombi W, Erradi M, Khoumsi A (2014) Automata-based approach to design and analyze security policies. In: Proceedings of the 12th annual international conference on privacy, security and trust (PST). IEEE, pp 306\u2013313","DOI":"10.1109\/PST.2014.6890953"},{"issue":"9","key":"655_CR12","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TPDS.2007.70802","volume":"19","author":"AX Liu","year":"2008","unstructured":"Liu AX, Gouda MG (2008) Diverse firewall design. IEEE Trans Parallel Distrib Syst 19(9):1237\u20131251","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"655_CR13","doi-asserted-by":"crossref","unstructured":"Mayer A, Wool A, Ziskind E (2000) Fang: a firewall analysis engine. In: Proceedings of IEEE symposium on security and privacy. IEEE, pp 177\u2013187","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"655_CR14","volume-title":"Computational complexity","author":"CH Papadimitriou","year":"2003","unstructured":"Papadimitriou CH (2003) Computational complexity. Wiley, New York"},{"key":"655_CR15","doi-asserted-by":"crossref","unstructured":"Reaz R, Acharya HB, Elmallah ES, Cobb JA, Gouda MG (2017) Policy expressions and the bottom-up design of computing policies. In: Technical report no. TR-17-01, Department of Computer Science, The Universisty of Texas at Austin. https:\/\/apps.cs.utexas.edu\/apps\/tech-reports","DOI":"10.1007\/978-3-319-59647-1_12"},{"key":"655_CR16","doi-asserted-by":"crossref","unstructured":"Reaz R, Ali M, Gouda MG, Heule MJ, Elmallah ES (2015) The implication problem of computing policies. In: Proceedings of the 17th international symposium on stabilization, safety, and security of distributed systems. Springer, pp 109\u2013123","DOI":"10.1007\/978-3-319-21741-3_8"},{"issue":"6","key":"655_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A Wool","year":"2004","unstructured":"Wool A (2004) A quantitative study of firewall configuration errors. Computer 37(6):62\u201367","journal-title":"Computer"},{"key":"655_CR18","unstructured":"Zhang S, Mahmoud A, Malik S, Narain S (2012) Verification and synthesis of firewalls using SAT and QBF. In: Proceedings of the 20th IEEE international conference on network protocols (ICNP). IEEE, pp 1\u20136"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0655-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0655-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0655-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T15:19:42Z","timestamp":1751815182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0655-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,25]]},"references-count":18,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["655"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0655-0","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2018,8,25]]},"assertion":[{"value":"21 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}