From access control models to access control metamodels: A survey
Access control (AC) is a computer security requirement used to control, in a computing
environment, what the user can access, when and how. Policy administration is an essential …
environment, what the user can access, when and how. Policy administration is an essential …
A review of access control metamodels
The emergence of ubiquitous computing, especially with the Internet of Things (IoT),
releases new prospects to traditional information systems by merging new technologies and …
releases new prospects to traditional information systems by merging new technologies and …
Language-independent synthesis of firewall policies
Configuring and maintaining a firewall configuration is notoriously hard. Policies are written
in low-level, platform-specific languages where firewall rules are inspected and enforced …
in low-level, platform-specific languages where firewall rules are inspected and enforced …
Can my firewall system enforce this policy?
L Ceragioli, P Degano, L Galletta - Computers & Security, 2022 - Elsevier
Firewalls are a fundamental tool for managing and protecting computer networks. They
behave according to a configuration that specifies the desired policy, ie, which packets are …
behave according to a configuration that specifies the desired policy, ie, which packets are …
Management of stateful firewall misconfiguration
Firewall configurations are evolving into dynamic policies that depend on protocol states. As
a result, stateful configurations tend to be much more error prone. Some errors occur on …
a result, stateful configurations tend to be much more error prone. Some errors occur on …
Mignis: A semantic based tool for firewall configuration
The management and specification of access control rules that enforce a given policy is a
non-trivial, complex, and time consuming task. In this paper we aim at simplifying this task …
non-trivial, complex, and time consuming task. In this paper we aim at simplifying this task …
[HTML][HTML] A deterministic approach for extracting network security intents
Intents brought significant improvements in network management by the use of intent-level
languages. Despite these improvements, intents are not yet fully integrated and deployed in …
languages. Despite these improvements, intents are not yet fully integrated and deployed in …
[PDF][PDF] Access Control Metamodels: Review, Critical Analysis, and Research Issues.
The new generation of networking environments such as the internet of things (IoT), cloud
computing, etc. is emerging and releases new prospects to traditional information systems …
computing, etc. is emerging and releases new prospects to traditional information systems …
A bottom-up approach for extracting network intents
Abstract Intent-Based Networking (IBN) is showing significant improvements in network
management, especially by reducing the complexity through intent-level languages …
management, especially by reducing the complexity through intent-level languages …
FWS: Analyzing, maintaining and transcompiling firewalls
C Bodei, L Ceragioli, P Degano… - Journal of …, 2021 - content.iospress.com
Firewalls are essential for managing and protecting computer networks. They permit
specifying which packets are allowed to enter a network, and also how these packets are …
specifying which packets are allowed to enter a network, and also how these packets are …