{"id":"https://openalex.org/W2889510294","doi":"https://doi.org/10.1109/iwcmc.2018.8450286","title":"Risk-based Decision for a Distributed and Cooperative network policy in Cloud Computing","display_name":"Risk-based Decision for a Distributed and Cooperative network policy in Cloud Computing","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2889510294","doi":"https://doi.org/10.1109/iwcmc.2018.8450286","mag":"2889510294"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2018.8450286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2018.8450286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000024919","display_name":"Ferdaous Kamoun-Abid","orcid":"https://orcid.org/0000-0002-2525-984X"},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Ferdaous Kamoun-Abid","raw_affiliation_strings":["NTS\u2019Com Research Unit, ENET\u2019COM, University of Sfax","NTS'Com Research Unit, ENET'COM, University of Sfax"],"affiliations":[{"raw_affiliation_string":"NTS\u2019Com Research Unit, ENET\u2019COM, University of Sfax","institution_ids":["https://openalex.org/I142899784"]},{"raw_affiliation_string":"NTS'Com Research Unit, ENET'COM, University of Sfax","institution_ids":["https://openalex.org/I142899784"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029959310","display_name":"Amel Meddeb-Makhlouf","orcid":"https://orcid.org/0000-0003-0551-4927"},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Amel Meddeb-Makhlouf","raw_affiliation_strings":["NTS\u2019Com Research Unit, ENET\u2019COM, University of Sfax","NTS'Com Research Unit, ENET'COM, University of Sfax"],"affiliations":[{"raw_affiliation_string":"NTS\u2019Com Research Unit, ENET\u2019COM, University of Sfax","institution_ids":["https://openalex.org/I142899784"]},{"raw_affiliation_string":"NTS'Com Research Unit, ENET'COM, University of Sfax","institution_ids":["https://openalex.org/I142899784"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075201943","display_name":"Faouzi Zarai","orcid":null},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi Zarai","raw_affiliation_strings":["NTS\u2019Com Research Unit, ENET\u2019COM, University of Sfax","NTS'Com Research Unit, ENET'COM, University of Sfax"],"affiliations":[{"raw_affiliation_string":"NTS\u2019Com Research Unit, ENET\u2019COM, University of Sfax","institution_ids":["https://openalex.org/I142899784"]},{"raw_affiliation_string":"NTS'Com Research Unit, ENET'COM, University of Sfax","institution_ids":["https://openalex.org/I142899784"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000024919"],"corresponding_institution_ids":["https://openalex.org/I142899784"],"apc_list":null,"apc_paid":null,"fwci":1.1405,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.85898119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1161","last_page":"1166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8394484519958496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7845942974090576},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6896182298660278},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.575278103351593},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5367449522018433},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5259953737258911},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.43539226055145264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3481610417366028},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13792702555656433}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8394484519958496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7845942974090576},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6896182298660278},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.575278103351593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5367449522018433},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5259953737258911},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.43539226055145264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3481610417366028},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13792702555656433},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2018.8450286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2018.8450286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1974489177","https://openalex.org/W2426687898","https://openalex.org/W2518093493","https://openalex.org/W2524169362","https://openalex.org/W2734471004","https://openalex.org/W2734634399","https://openalex.org/W3026320275","https://openalex.org/W6717650379","https://openalex.org/W6777239920"],"related_works":["https://openalex.org/W2385980761","https://openalex.org/W2896439152","https://openalex.org/W2354413335","https://openalex.org/W2402592140","https://openalex.org/W1541380622","https://openalex.org/W2578979269","https://openalex.org/W2777692589","https://openalex.org/W2184126752","https://openalex.org/W1513907159","https://openalex.org/W1632686634"],"abstract_inverted_index":{"The":[0,63,100],"distribution's":[1],"feature":[2],"of":[3,10,19,41,52,71,107],"cloud":[4,43,91],"computing":[5],"and":[6,12,30,59,79,109],"the":[7,17,39,42,50,85,94],"increasing":[8],"threat":[9],"attacks":[11],"malicious":[13],"activities":[14],"make":[15],"necessary":[16],"use":[18,51],"distributed":[20,58],"firewalls":[21],"to":[22,25,37],"control":[23,31,83],"access":[24,28,54,82],"networks.":[26],"Network-based":[27],"management":[29],"is":[32,66],"an":[33],"essential":[34],"research":[35],"challenge":[36],"enhance":[38],"security":[40],"network.":[44],"We":[45],"propose,":[46],"in":[47,56,84,105],"this":[48],"paper":[49],"risk-based":[53,80],"decisions":[55,78],"a":[57,69],"cooperative":[60],"firewall":[61],"topology.":[62],"proposed":[64],"model":[65],"based":[67],"on":[68],"combination":[70],"eXtensible":[72],"Access":[73],"Control":[74],"Markup":[75],"Language":[76],"(XACML)":[77],"network":[81,92],"cloud.":[86],"For":[87],"proof,":[88],"we":[89],"simulate":[90],"using":[93],"NeSSi":[95],"<sup":[96],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[97],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[98],"tool.":[99],"obtained":[101],"results":[102],"are":[103],"promising":[104],"term":[106],"delay":[108],"blocking":[110],"rate.":[111]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
