{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:50:06Z","timestamp":1773082206825,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"POLUX","award":["ANR-06-SETIN-012"],"award-info":[{"award-number":["ANR-06-SETIN-012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533092","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"251-261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Semantic context aware security policy deployment"],"prefix":"10.1145","author":[{"given":"Stere","family":"Preda","sequence":"first","affiliation":[{"name":"IT TELECOM Bretagne, C\u00e9sson-S\u00e9vign\u00e9, France"}]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[{"name":"IT TELECOM Bretagne, C\u00e9sson-S\u00e9vign\u00e9, France"}]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[{"name":"IT TELECOM Bretagne, C\u00e9sson-S\u00e9vign\u00e9, France"}]},{"given":"Joaquin G.","family":"Alfaro","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]},{"given":"Laurent","family":"Toutain","sequence":"additional","affiliation":[{"name":"IT TELECOM Bretagne, C\u00e9sson-S\u00e9vign\u00e9, France"}]},{"given":"Yehia","family":"Elrakaiby","sequence":"additional","affiliation":[{"name":"IT TELECOM Bretagne, C\u00e9sson-S\u00e9vign\u00e9, France"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"120","volume-title":"Organization Based Access Control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks","author":"Abou el Kalam A.","year":"2003","unstructured":"Abou el Kalam , A. , Baida , R. E. , Balbiani , P. , Benferhat , S. , Cuppens , F. , Deswarte , Y. , Mi\u00e8ge , A. , Saurel , C. , and Trouessin , G . Organization Based Access Control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks , pp. 120 -- 131 , Lake Come, Italy , 2003 . Abou el Kalam, A., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., and Trouessin, G. Organization Based Access Control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120--131, Lake Come, Italy, 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems (SSI)","author":"Autrel F.","year":"2008","unstructured":"Autrel , F. , Cuppens , F. , Cuppens-Boulahia , N. , and Coma , C . MotOrBAC 2: A security policy tool . In 3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems (SSI) , Loctudy, France, Octobre 2008 . Autrel, F., Cuppens, F., Cuppens-Boulahia, N., and Coma, C. MotOrBAC 2: A security policy tool. In 3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems (SSI), Loctudy, France, Octobre 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_30"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0045-7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/648050.746051"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/645347.650658"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647183.719484"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1130234.1130245"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0051-9"},{"key":"e_1_3_2_1_13_1","first-page":"203","volume-title":"2nd Workshop on Formal Aspects in Security and Trust","author":"Cuppens F.","year":"2004","unstructured":"Cuppens , F. , Cuppens-Boulahia , N. , Sans , T. and Miege , A . A formal approach to specify and deploy a network security policy . In 2nd Workshop on Formal Aspects in Security and Trust , pp. 203 -- 218 , Toulouse, France , 2004 . Cuppens, F., Cuppens-Boulahia, N., Sans, T. and Miege, A. A formal approach to specify and deploy a network security policy. In 2nd Workshop on Formal Aspects in Security and Trust, pp. 203--218, Toulouse, France, 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"D. and Debar H. Negotiation of Prohibition: An Approach Based on Policy Rewriting. In 23rd International Information Security Conference (SEC 2008","author":"Cuppens-Boulahia N.","year":"2008","unstructured":"Cuppens-Boulahia , N. , Cuppens , F. , Abi Haidar , D. and Debar H. Negotiation of Prohibition: An Approach Based on Policy Rewriting. In 23rd International Information Security Conference (SEC 2008 ), Italy , September 2008 . Cuppens-Boulahia, N., Cuppens, F., Abi Haidar, D. and Debar H. Negotiation of Prohibition: An Approach Based on Policy Rewriting. In 23rd International Information Security Conference (SEC 2008), Italy, September 2008."},{"key":"e_1_3_2_1_15_1","volume-title":"Journal in Computer Virology (JCV), 3(3):195--210","author":"Debar H.","year":"2007","unstructured":"Debar , H. , Thomas , Y. , Cuppens , F. and Cuppens-Boulahia , N. Enabling Automated Threat Response through the Use of a Dynamic Security Policy . In Journal in Computer Virology (JCV), 3(3):195--210 , 2007 . Debar, H., Thomas, Y., Cuppens, F. and Cuppens-Boulahia, N. Enabling Automated Threat Response through the Use of a Dynamic Security Policy. In Journal in Computer Virology (JCV), 3(3):195--210, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2006.35"},{"key":"e_1_3_2_1_18_1","volume-title":"Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection. In International Symp. on Network Computing and Applications","author":"Hwang K.","year":"2001","unstructured":"Hwang , K. and Gangadhran , M . Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection. In International Symp. on Network Computing and Applications , 2001 . Hwang, K. and Gangadhran, M. Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection. In International Symp. on Network Computing and Applications, 2001."},{"key":"e_1_3_2_1_19_1","unstructured":"IETF Netconf Working Group. {On-line}. Available from: http:\/\/www.ops.ietf.org\/netconf\/.  IETF Netconf Working Group. {On-line}. Available from: http:\/\/www.ops.ietf.org\/netconf\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775422"},{"key":"e_1_3_2_1_21_1","unstructured":"Permis project. {On-line}. Available from: http:\/\/sec.cs.kent.ac.uk\/permis\/.  Permis project. {On-line}. Available from: http:\/\/sec.cs.kent.ac.uk\/permis\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Reliable Process for Security Policy Deployment. In International Conf. on Security and Cryptography","author":"Preda S.","year":"2007","unstructured":"Preda , S. , Cuppens , F. , Cuppens-Boulahia , N. , Alfaro , J. G. , and Toutain , L . Reliable Process for Security Policy Deployment. In International Conf. on Security and Cryptography , Spain , 2007 . Preda, S., Cuppens, F., Cuppens-Boulahia, N., Alfaro, J. G., and Toutain, L. Reliable Process for Security Policy Deployment. In International Conf. on Security and Cryptography, Spain, 2007."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_24_1","unstructured":"Shibboleth system. {On-line}. Available from: http:\/\/shibboleth.internet2.edu\/.  Shibboleth system. {On-line}. Available from: http:\/\/shibboleth.internet2.edu\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Solutions for the Next Generation","author":"Strassner C. J.","year":"2004","unstructured":"Strassner , C. J. Policy-based Network Management , Solutions for the Next Generation . Elsevier, Morgan Kaufmann Publishers 2004 . ISBN: 1-55860-859-1. Strassner, C. J. Policy-based Network Management, Solutions for the Next Generation. Elsevier, Morgan Kaufmann Publishers 2004. ISBN: 1-55860-859-1."},{"key":"e_1_3_2_1_26_1","first-page":"431","volume-title":"9th International Conf. on Parallel and Distributed Systems","author":"Xian F.","year":"2002","unstructured":"Xian , F. , Jin , H. , Liu , K. and Han , Z . A Mobile-Agent based Distributed Dynamic &mu;Firewall Architecture . In 9th International Conf. on Parallel and Distributed Systems , pp. 431 -- 436 , 2002 . Xian, F., Jin, H., Liu, K. and Han, Z. A Mobile-Agent based Distributed Dynamic &mu;Firewall Architecture. In 9th International Conf. on Parallel and Distributed Systems, pp. 431--436, 2002."},{"key":"e_1_3_2_1_27_1","unstructured":"YencaP a Netconf agent for Linux. {On-line}. Available from: http:\/\/ensuite.sourceforge.net\/.  YencaP a Netconf agent for Linux. {On-line}. Available from: http:\/\/ensuite.sourceforge.net\/."}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","location":"Sydney Australia","acronym":"Asia CCS 09","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":27,"alternative-id":["10.1145\/1533057.1533092","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533092","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}