{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:48Z","timestamp":1750306368482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T00:00:00Z","timestamp":1465171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-14-C-0139"],"award-info":[{"award-number":["H98230-14-C-0139"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,6]]},"DOI":"10.1145\/2914642.2914646","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:09:57Z","timestamp":1465564197000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Tri-Modularization of Firewall Policies"],"prefix":"10.1145","author":[{"given":"Haining","family":"Chen","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Omar","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Warut","family":"Khern-am-nuai","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Suresh","family":"Chari","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Ian","family":"Molloy","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Youngja","family":"Park","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IBM CPLEX optimizer.small http:\/\/www-01.ibm.com\/software\/commerce\/optimization\/cplex-optimizer\/.  IBM CPLEX optimizer.small http:\/\/www-01.ibm.com\/software\/commerce\/optimization\/cplex-optimizer\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Juniper. http:\/\/www.juniper.net\/.  Juniper. http:\/\/www.juniper.net\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Netfilter. http:\/\/www.netfilter.org\/.  Netfilter. http:\/\/www.netfilter.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"SPMF\n  : An Open-Source Data Mining Library. http:\/\/www.philippe-fournier-viger.com\/spmf\/.  SPMF: An Open-Source Data Mining Library. http:\/\/www.philippe-fournier-viger.com\/spmf\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2015038.2015496"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.32"},{"key":"e_1_3_2_1_7_1","first-page":"487","volume-title":"VLDB '94","author":"Agrawal R.","year":"1994","unstructured":"R. Agrawal and R. Srikant . Fast algorithms for mining association rules in large databases . In VLDB '94 , pages 487 -- 499 , 1994 . R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB '94, pages 487--499, 1994."},{"key":"e_1_3_2_1_8_1","first-page":"17","volume-title":"IM'03","author":"Al-Shaer E.","year":"2003","unstructured":"E. Al-Shaer and H. Hamed . Firewall policy advisor for anomaly detection and rule editing . In IM'03 , pages 17 -- 30 , 2003 . E. Al-Shaer and H. Hamed. Firewall policy advisor for anomaly detection and rule editing. In IM'03, pages 17--30, 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2004.4623689"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"e_1_3_2_1_12_1","volume-title":"Design and implementation of firewall policy advisor tools. Technical report","author":"Hamed E. S.","year":"2002","unstructured":"E. S. Al-shaer and H. H. Hamed . Design and implementation of firewall policy advisor tools. Technical report , 2002 . http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.134.3344. E. S. Al-shaer and H. H. Hamed. Design and implementation of firewall policy advisor tools. Technical report, 2002. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.134.3344."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(03)00213-5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035582.1035583"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240166.2240177"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/355604.361591"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2006.1687561"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.015"},{"key":"e_1_3_2_1_19_1","first-page":"120","volume-title":"IEEE SP'97","author":"Guttman J. D.","year":"1997","unstructured":"J. D. Guttman . Filtering postures : Local enforcement for global policies . In IEEE SP'97 , pages 120 -- 129 , 1997 . J. D. Guttman. Filtering postures: Local enforcement for global policies. In IEEE SP'97, pages 120--129, 1997."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0052-x"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Systematic structural testing of firewall policies","volume":"9","author":"Hwang J.","year":"2012","unstructured":"J. Hwang , T. Xie , F. Chen , and A. X. Liu . Systematic structural testing of firewall policies . IEEE TNSM , 9 ( 1 ): 1 -- 11 , 2012 . J. Hwang, T. Xie, F. Chen, and A. X. Liu. Systematic structural testing of firewall policies. IEEE TNSM, 9(1):1--11, 2012.","journal-title":"IEEE TNSM"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2109211.2109212"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70802"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.263"},{"key":"e_1_3_2_1_27_1","first-page":"71","volume-title":"USENIX ATC'05","author":"Marmorstein R.","year":"2005","unstructured":"R. Marmorstein and P. Kearns . A tool for automated iptables firewall analysis . In USENIX ATC'05 , pages 71 -- 81 , 2005 . R. Marmorstein and P. Kearns. A tool for automated iptables firewall analysis. In USENIX ATC'05, pages 71--81, 2005."},{"key":"e_1_3_2_1_28_1","first-page":"41","volume-title":"LISA '06","author":"Marmorstein R.","year":"2006","unstructured":"R. Marmorstein and P. Kearns . Firewall analysis with policy-based host classification . In LISA '06 , pages 41 -- 51 , 2006 . R. Marmorstein and P. Kearns. Firewall analysis with policy-based host classification. In LISA '06, pages 41--51, 2006."},{"key":"e_1_3_2_1_29_1","first-page":"177","volume-title":"Fang: A firewall analysis engine","author":"Mayer A.","year":"2000","unstructured":"A. Mayer , A. Wool , and E. Ziskind . Fang: A firewall analysis engine . IEEE S &P'00, pages 177 -- 187 , 2000 . A. Mayer, A. Wool, and E. Ziskind. Fang: A firewall analysis engine. IEEE S&P'00, pages 177--187, 2000."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377840"},{"issue":"2","key":"e_1_3_2_1_31_1","first-page":"223","article-title":"An intelligent security architecture for distributed firewalling environments","volume":"4","author":"Santis A. D.","year":"2013","unstructured":"A. D. Santis , A. Castiglione , U. Fiore , and F. Palmieri . An intelligent security architecture for distributed firewalling environments . JAIHC , 4 ( 2 ): 223 -- 234 , 2013 . A. D. Santis, A. Castiglione, U. Fiore, and F. Palmieri. An intelligent security architecture for distributed firewalling environments. JAIHC, 4(2):223--234, 2013.","journal-title":"JAIHC"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064008"},{"key":"e_1_3_2_1_33_1","first-page":"17","volume-title":"LISA'07","author":"Tongaonkar A.","year":"2007","unstructured":"A. Tongaonkar , N. Inamdar , and R. Sekar . Inferring higher level policies from firewall rules . In LISA'07 , pages 17 -- 26 , 2007 . A. Tongaonkar, N. Inamdar, and R. Sekar. Inferring higher level policies from firewall rules. In LISA'07, pages 17--26, 2007."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370677.1370681"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_1_36_1","first-page":"439","volume-title":"ICSE'81","author":"Weiser M.","year":"1981","unstructured":"M. Weiser . Program slicing. In ICSE'81 , pages 439 -- 449 , 1981 . M. Weiser. Program slicing. In ICSE'81, pages 439--449, 1981."},{"key":"e_1_3_2_1_37_1","volume-title":"SSYM'01","author":"Wool A.","year":"2001","unstructured":"A. Wool . Architecting the lumeta firewall analyzer . In SSYM'01 , 2001 . A. Wool. Architecting the lumeta firewall analyzer. In SSYM'01, 2001."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.29"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.16"}],"event":{"name":"SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Shanghai China","acronym":"SACMAT 2016"},"container-title":["Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2914642.2914646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2914642.2914646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:26Z","timestamp":1750222586000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2914642.2914646"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":40,"alternative-id":["10.1145\/2914642.2914646","10.1145\/2914642"],"URL":"https:\/\/doi.org\/10.1145\/2914642.2914646","relation":{},"subject":[],"published":{"date-parts":[[2016,6,6]]},"assertion":[{"value":"2016-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}