{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:21:05Z","timestamp":1740158465026,"version":"3.37.3"},"reference-count":34,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T00:00:00Z","timestamp":1528070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13174-018-0083-6","type":"journal-article","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T11:39:07Z","timestamp":1526470747000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A new approach to deploy a self-adaptive distributed firewall"],"prefix":"10.5753","volume":"9","author":[{"given":"Edmilson P.","family":"da Costa J\u00fanior","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9608-439X","authenticated-orcid":false,"given":"Carlos Eduardo","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Marcos","family":"Pinheiro","sequence":"additional","affiliation":[]},{"given":"Silvio","family":"Sampaio","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2018,6,4]]},"reference":[{"key":"83_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052","volume-title":"Proceedings of the 7th ACM Conference on Computer and Communications Security","author":"S Ioannidis","year":"2000","unstructured":"Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a Distributed Firewall. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. New York: ACM: 2000. p. 190\u20139. CCS \u201900. \n                    https:\/\/doi.org\/10.1145\/352600.353052\n                    \n                  ."},{"issue":"5","key":"83_CR2","first-page":"39","volume":"24","author":"SM Bellovin","year":"1999","unstructured":"Bellovin SM. Distributed Firewalls. J Login. 1999; 24(5):39\u201347. \n                    https:\/\/www.cs.columbia.edu\/~smb\/papers\/distfw.pdf\n                    \n                  .","journal-title":"J Login"},{"issue":"1","key":"83_CR3","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/2785733","volume":"48","author":"G Meng","year":"2015","unstructured":"Meng G, Liu Y, Zhang J, Pokluda A, Boutaba R. Collaborative Security: A Survey and Taxonomy. ACM Comput Surv. 2015; 48(1):1:1\u20131:42. \n                    https:\/\/doi.org\/10.1145\/2785733\n                    \n                  .","journal-title":"ACM Comput Surv"},{"key":"83_CR4","unstructured":"Young G, Pescatore J. Magic quadrant for enterprise network firewalls. Tech. Rep. 141050, Gartner RAS Core G. 2008. \n                    http:\/\/www.eircomictdirect.ie\/docs\/juniper\/gartner\/_magic\/_quadrant\/_2008.pdf\n                    \n                  ."},{"issue":"5","key":"83_CR5","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.jcss.2014.02.003","volume":"80","author":"C Bailey","year":"2014","unstructured":"Bailey C, Chadwick DW, de Lemos R. Self-adaptive federated authorization infrastructures. J Comput Syst Sci. 2014; 80(5):935\u201352. \n                    https:\/\/doi.org\/10.1016\/j.jcss.2014.02.003\n                    \n                  .","journal-title":"J Comput Syst Sci"},{"key":"83_CR6","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393618","volume-title":"Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering","author":"L Pasquale","year":"2012","unstructured":"Pasquale L, Menghi C, Salehie M, Cavallaro L, Omoronyia I, Nuseibeh B. SecuriTAS: A Tool for Engineering Adaptive Security. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. New York: ACM: 2012. p. 19:1\u201319:4. FSE \u201912. \n                    https:\/\/doi.org\/10.1145\/2393596.2393618\n                    \n                  ."},{"key":"83_CR7","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465479","volume-title":"Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures","author":"E Yuan","year":"2013","unstructured":"Yuan E, Malek S, Schmerl B, Garlan D, Gennari J. Architecture-based Self-protecting Software Systems. In: Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures. New York: ACM: 2013. p 33\u201342. QoSA \u201913. \n                    https:\/\/doi.org\/10.1145\/2465478.2465479\n                    \n                  ."},{"key":"83_CR8","unstructured":"da Costa Jr. EP, da Silva CE, Madruga M, Medeiros ST. XVI Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg2016). 2016. http:\/\/sbseg2016.ic.uff.br\/pt\/files\/anais\/completos\/ST7-1.pdf. Accessed 15 Mar 2018."},{"key":"83_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9","volume-title":"Software Engineering for Self-Adaptive Systems","author":"BH Cheng","year":"2009","unstructured":"Cheng BH, et al.Software Engineering for Self-Adaptive Systems: A Research Roadmap In: Cheng BH, de Lemos R, Giese H, Inverardi P, Magee J, editors. Software Engineering for Self-Adaptive Systems. Berlin: Springer-Verlag: 2009. p. 1\u201326. \n                    https:\/\/doi.org\/10.1007\/978-3-642-02161-9_1\n                    \n                  ."},{"key":"83_CR10","volume-title":"Computer Networking: A Top-Down Approach. 6th ed","author":"JF Kurose","year":"2012","unstructured":"Kurose JF, Ross KW. Computer Networking: A Top-Down Approach. 6th ed. New York: Pearson; 2012."},{"issue":"1","key":"83_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart JO, Chess DM. The Vision of Autonomic Computing. IEEE Comput. 2003; 36(1):41\u201350. \n                    https:\/\/doi.org\/10.1109\/MC.2003.1160055\n                    \n                  .","journal-title":"IEEE Comput"},{"issue":"3","key":"83_CR12","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/2724719","volume":"10","author":"DGDL Iglesia","year":"2015","unstructured":"Iglesia DGDL, Weyns D. MAPE-K Formal Templates to Rigorously Design Behaviors for Self-Adaptive Systems. ACM Trans Auton Adapt Syst. 2015; 10(3):15:1\u201315:31. \n                    https:\/\/doi.org\/10.1145\/2724719\n                    \n                  .","journal-title":"ACM Trans Auton Adapt Syst"},{"key":"83_CR13","doi-asserted-by":"crossref","unstructured":"Sweitzer JW, Draper C. Architecture Overview for Autonomic Computing In: Parashar M, Hariri S, editors. Autonomic Computing: Concepts, Infrastructure, and Applications. CRC Press: 2006. p. 71\u201398.","DOI":"10.1201\/9781420009354.ch5"},{"key":"83_CR14","doi-asserted-by":"crossref","unstructured":"Vromant P, Weyns D, Malek S, Andersson J. On Interacting Control Loops in Self-Adaptative Systems. In: Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems: 2011. p. 202\u20137. https:\/\/doi.org\/10.1145\/1988008.1988037.","DOI":"10.1145\/1988008.1988037"},{"key":"83_CR15","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266871","volume-title":"Proceedings of the 12th ACM Symposium on Access Control Models and Technologies","author":"B Zhang","year":"2007","unstructured":"Zhang B, Al-Shaer E, Jagadeesan R, Riely J, Pitcher C. Specifications of a High-level Conflict-free Firewall Policy Language for Multi-domain Networks. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. New York: ACM: 2007. p. 185\u201394. SACMAT \u201907. \n                    https:\/\/doi.org\/10.1145\/1266840.1266871\n                    \n                  ."},{"key":"83_CR16","doi-asserted-by":"crossref","unstructured":"Al-Shaer E. In: Automated Firewall Analytics: Design, Configuration and Optimization. Springer International Publishing: 2014. p. 49\u201374. chap. Specification and Refinement of a Conflict-Free Distributed Firewall Configuration Language. https:\/\/doi.org\/10.1007\/978-3-319-10371-6\\_3.","DOI":"10.1007\/978-3-319-10371-6"},{"key":"83_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/11853886_5","volume-title":"An Event-Condition-Action Logic Programming Language","author":"JJ Alferes","year":"2006","unstructured":"Alferes JJ, Banti F, Brogi A. An Event-Condition-Action Logic Programming Language. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006, pp. 29\u201342. \n                    https:\/\/doi.org\/10.1007\/11853886_5\n                    \n                  ."},{"key":"83_CR18","volume-title":"Network Security Essentials: Applications and Standards","author":"W Stallings","year":"2010","unstructured":"Stallings W. Network Security Essentials: Applications and Standards, 4th edn. Englewood Cliffs: Prentice Hall; 2010."},{"key":"83_CR19","doi-asserted-by":"crossref","unstructured":"Lai Y, Jiang G, Li J, Yang Z. Design and Implementation of Distributed Firewall System for IPv6. In: Communication Software and Networks, 2009. ICCSN \u201909. International Conference on: 2009. p. 428\u201332. https:\/\/doi.org\/10.1109\/ICCSN.2009.121.","DOI":"10.1109\/ICCSN.2009.121"},{"key":"83_CR20","doi-asserted-by":"crossref","unstructured":"Chadwick DW, Zhao G, Otenko S, Laborde R, Su L, Nguyen TA. PERMIS: a modular authorization infrastructure, Concurrency and Computation: Practice & Experience. 2008; 20(11):1341\u201357. https:\/\/doi.org\/10.1002\/cpe.v20:11.","DOI":"10.1002\/cpe.v20:11"},{"key":"83_CR21","doi-asserted-by":"crossref","unstructured":"Uribe TE, Cheung S. Automatic Analysis of Firewall and Network Intrusion Detection System Configurations. In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering (FMSE 2004): 2004. p. 66\u201374. https:\/\/doi.org\/10.1145\/1029133.1029143.","DOI":"10.1145\/1029133.1029143"},{"issue":"4","key":"83_CR22","doi-asserted-by":"publisher","first-page":"24:1","DOI":"10.1145\/1636665.1636670","volume":"4","author":"Z Zhang","year":"2009","unstructured":"Zhang Z, Shen H. M-AID: An Adaptive Middleware Built Upon Anomaly Detectors for Intrusion Detection and Rational Response. ACM Trans Auton Adapt Syst. 2009; 4(4):24:1\u201324:35. \n                    https:\/\/doi.org\/10.1145\/1636665.1636670\n                    \n                  .","journal-title":"ACM Trans Auton Adapt Syst"},{"key":"83_CR23","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897918","volume-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","author":"B Rahbarinia","year":"2016","unstructured":"Rahbarinia B, Balduzzi M, Perdisci R. Real-Time Detection of Malware Downloads via Large-Scale URL \u2192 File \u2192 Machine Graph Mining. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York: ACM: 2016. p. 783\u201394. ASIA CCS \u201916. \n                    https:\/\/doi.org\/10.1145\/2897845.2897918\n                    \n                  ."},{"key":"83_CR24","doi-asserted-by":"crossref","unstructured":"Iannucci S, Abdelwahed S. A Probabilistic Approach to Autonomic Security Management. In: 2016 IEEE International Conference on Autonomic Computing (ICAC): 2016. p. 157\u201366. https:\/\/doi.org\/10.1109\/ICAC.2016.12.","DOI":"10.1109\/ICAC.2016.12"},{"key":"83_CR25","unstructured":"dos Santos LAF, Campiolo R, Monteverde WA, Batista DM. Abordagem auton\u00f4mica para mitigar ciberataques em LANs. In: Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos (SBRC): 2016. p. 600\u201313. http:\/\/www.sbrc2016.ufba.br\/downloads\/SessoesTecnicas\/152417.pdf."},{"key":"83_CR26","doi-asserted-by":"crossref","unstructured":"Shin S, Xu L, Hong S, Gu G. Enhancing Network Security through Software Defined Networking (SDN). In: Proceedings of the 25th International Conference on Computer Communication and Networks ICCCN \u201916, vol. 1: 2016. p. 1\u20139. https:\/\/doi.org\/10.1109\/ICCCN.2016.7568520.","DOI":"10.1109\/ICCCN.2016.7568520"},{"key":"83_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.cose.2015.05.006","volume":"53","author":"I Alsmadi","year":"2015","unstructured":"Alsmadi I, Xu D. Security of Software Defined Networks: A survey. Comput Secur. 2015; 53:79\u2013108. \n                    https:\/\/doi.org\/10.1016\/j.cose.2015.05.006\n                    \n                  .","journal-title":"Comput Secur"},{"key":"83_CR28","doi-asserted-by":"crossref","unstructured":"Daniel J, Dimitrakos T, El-Moussa F, Ducatel G, Pawar P, Sajjad A. Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science: 2014. p. 1021\u20136. https:\/\/doi.org\/10.1109\/CloudCom.2014.92.","DOI":"10.1109\/CloudCom.2014.92"},{"key":"83_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18491-3_21","volume-title":"Trust Management IX","author":"PS Pawar","year":"2015","unstructured":"Pawar PS, Sajjad A, Dimitrakos T, Chadwick DW. Security-as-a-Service in Multi-cloud and Federated Cloud Environments In: Damsgaard Jensen C, Marsh S, Dimitrakos T, Murayama Y, editors. Trust Management IX. Cham: Springer International Publishing: 2015. p. 251\u201361. \n                    https:\/\/doi.org\/10.1007\/978-3-319-18491-3_21\n                    \n                  ."},{"issue":"3","key":"83_CR30","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11416-007-0039-z","volume":"3","author":"H Debar","year":"2007","unstructured":"Debar H, Thomas Y, Cuppens F, Cuppens-Boulahia N. Enabling automated threat response through the use of a dynamic security policy. J Comput Virol. 2007; 3(3):195\u2013210. \n                    https:\/\/doi.org\/10.1007\/s11416-007-0039-z\n                    \n                  .","journal-title":"J Comput Virol"},{"key":"83_CR31","doi-asserted-by":"crossref","unstructured":"Sheridan C, Massonet P, Phee A. Deployment-Time Multi-Cloud Application Security. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP): 2017. p. 1\u20135. https:\/\/doi.org\/10.1109\/SMARTCOMP.2017.7947000.","DOI":"10.1109\/SMARTCOMP.2017.7947000"},{"key":"83_CR32","unstructured":"van der Ham J, Dijkstra F, Apacz R, Zurawski J. Network markup language base schema version 1. 2013. Grid Final Draft (GFD), Proposed Recommendation (R-P) GFD-R-P.206, Open Grid Forum. https:\/\/www.ogf.org\/documents\/GFD.206.pdf. Accessed 15 Mar 2018."},{"key":"83_CR33","doi-asserted-by":"crossref","unstructured":"Pozo S, Varela-Vaca AJ, Gasca RM. AFPL2, an Abstract Language for Firewall ACLs with NAT Support. In: Second International Conference on Dependability (DEPEND 2009): 2009. p. 52\u20139. https:\/\/doi.org\/10.1109\/DEPEND.2009.14.","DOI":"10.1109\/DEPEND.2009.14"},{"key":"83_CR34","unstructured":"DMTF. Network policy management profile. 2016. https:\/\/www.dmtf.org\/sites\/default\/files\/standards\/documents\/DSP1048_1.0.0c_0.pdf. Accessed 15 Mar 2018."}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0083-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-018-0083-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0083-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T22:15:27Z","timestamp":1644444927000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-018-0083-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,4]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["83"],"URL":"https:\/\/doi.org\/10.1186\/s13174-018-0083-6","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"type":"print","value":"1867-4828"},{"type":"electronic","value":"1869-0238"}],"subject":[],"published":{"date-parts":[[2018,6,4]]},"assertion":[{"value":"24 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author(s) declare(s) that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"12"}}