From access control models to access control metamodels: A survey

N Kashmar, M Adda, M Atieh - … : Proceedings of the 2019 Future of …, 2020 - Springer
Access control (AC) is a computer security requirement used to control, in a computing
environment, what the user can access, when and how. Policy administration is an essential …

A review of access control metamodels

N Kashmar, M Adda, M Atieh, H Ibrahim - Procedia Computer Science, 2021 - Elsevier
The emergence of ubiquitous computing, especially with the Internet of Things (IoT),
releases new prospects to traditional information systems by merging new technologies and …

Language-independent synthesis of firewall policies

C Bodei, P Degano, L Galletta… - 2018 ieee european …, 2018 - ieeexplore.ieee.org
Configuring and maintaining a firewall configuration is notoriously hard. Policies are written
in low-level, platform-specific languages where firewall rules are inspected and enforced …

Can my firewall system enforce this policy?

L Ceragioli, P Degano, L Galletta - Computers & Security, 2022 - Elsevier
Firewalls are a fundamental tool for managing and protecting computer networks. They
behave according to a configuration that specifies the desired policy, ie, which packets are …

Management of stateful firewall misconfiguration

J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia… - Computers & …, 2013 - Elsevier
Firewall configurations are evolving into dynamic policies that depend on protocol states. As
a result, stateful configurations tend to be much more error prone. Some errors occur on …

Mignis: A semantic based tool for firewall configuration

P Adão, C Bozzato, G Dei Rossi… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
The management and specification of access control rules that enforce a given policy is a
non-trivial, complex, and time consuming task. In this paper we aim at simplifying this task …

[HTML][HTML] A deterministic approach for extracting network security intents

RH Ribeiro, AS Jacobs, L Zembruzki, R Parizotto… - Computer Networks, 2022 - Elsevier
Intents brought significant improvements in network management by the use of intent-level
languages. Despite these improvements, intents are not yet fully integrated and deployed in …

[PDF][PDF] Access Control Metamodels: Review, Critical Analysis, and Research Issues.

N Kashmar, M Adda, H Ibrahim - J. Ubiquitous Syst. Pervasive Networks, 2022 - iasks.org
The new generation of networking environments such as the internet of things (IoT), cloud
computing, etc. is emerging and releases new prospects to traditional information systems …

A bottom-up approach for extracting network intents

RH Ribeiro, AS Jacobs, R Parizotto… - … : Proceedings of the 34th …, 2020 - Springer
Abstract Intent-Based Networking (IBN) is showing significant improvements in network
management, especially by reducing the complexity through intent-level languages …

FWS: Analyzing, maintaining and transcompiling firewalls

C Bodei, L Ceragioli, P Degano… - Journal of …, 2021 - content.iospress.com
Firewalls are essential for managing and protecting computer networks. They permit
specifying which packets are allowed to enter a network, and also how these packets are …