{"id":"https://openalex.org/W2152864862","doi":"https://doi.org/10.1145/2003476.2003489","title":"Symbolic analysis of network security policies using rewrite systems","display_name":"Symbolic analysis of network security policies using rewrite systems","publication_year":2011,"publication_date":"2011-07-20","ids":{"openalex":"https://openalex.org/W2152864862","doi":"https://doi.org/10.1145/2003476.2003489","mag":"2152864862"},"language":"en","primary_location":{"id":"doi:10.1145/2003476.2003489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2003476.2003489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/inria-00567858","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044354355","display_name":"Tony Bourdier","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Tony Bourdier","raw_affiliation_strings":["INRIA Nancy &amp; LORIA &amp; Universit\u00e9 Henri Poincar\u00e9, Villers les Nancy, France"],"affiliations":[{"raw_affiliation_string":"INRIA Nancy &amp; LORIA &amp; Universit\u00e9 Henri Poincar\u00e9, Villers les Nancy, France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1326498283","https://openalex.org/I90183372","https://openalex.org/I4210127166"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015822800","display_name":"Horatiu Cirstea","orcid":"https://orcid.org/0000-0001-5105-5931"},"institutions":[{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Horatiu Cirstea","raw_affiliation_strings":["INRIA Nancy &amp; LORIA &amp; Universit\u00e9 de Nancy 2, Villers les Nancy, France"],"affiliations":[{"raw_affiliation_string":"INRIA Nancy &amp; LORIA &amp; Universit\u00e9 de Nancy 2, Villers les Nancy, France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1326498283","https://openalex.org/I90183372","https://openalex.org/I4210127166"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044354355"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I4210121838","https://openalex.org/I4210127166","https://openalex.org/I90183372"],"apc_list":null,"apc_paid":null,"fwci":0.2577,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60160206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"77","last_page":"88"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8224790692329407},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7139791250228882},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5325409770011902},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.5063940286636353},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5037373900413513},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.48406997323036194},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3677772879600525},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.15211156010627747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8224790692329407},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7139791250228882},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5325409770011902},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.5063940286636353},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5037373900413513},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.48406997323036194},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3677772879600525},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.15211156010627747},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/2003476.2003489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2003476.2003489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.205.6426","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.6426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://tony.bourdier.free.fr/cite/ppdp.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.220.6424","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.6424","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://hal.inria.fr/docs/00/58/73/12/PDF/ppdp11.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.736.667","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.736.667","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://hal.inria.fr/inria-00567858/PDF/ppdp11.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:inria-00567858v2","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00567858","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://portal.acm.org/citation.cfm?id=2003489&CFID=37282707&CFTOKEN=28592488","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:inria-00567858v2","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00567858","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://portal.acm.org/citation.cfm?id=2003489&CFID=37282707&CFTOKEN=28592488","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2517132","https://openalex.org/W72463235","https://openalex.org/W91193428","https://openalex.org/W101001524","https://openalex.org/W193668645","https://openalex.org/W657159919","https://openalex.org/W1480487311","https://openalex.org/W1504007491","https://openalex.org/W1517413638","https://openalex.org/W1551719154","https://openalex.org/W1567531241","https://openalex.org/W1577485093","https://openalex.org/W1582044627","https://openalex.org/W1583295953","https://openalex.org/W1586794044","https://openalex.org/W1593799327","https://openalex.org/W1639322829","https://openalex.org/W2031468111","https://openalex.org/W2035652450","https://openalex.org/W2071510102","https://openalex.org/W2083846213","https://openalex.org/W2088129830","https://openalex.org/W2096244038","https://openalex.org/W2106404099","https://openalex.org/W2110704347","https://openalex.org/W2132434720","https://openalex.org/W2134368869","https://openalex.org/W2144338762","https://openalex.org/W2148656332","https://openalex.org/W2156645025","https://openalex.org/W2168101531","https://openalex.org/W2561675875","https://openalex.org/W2913158960","https://openalex.org/W6606254317","https://openalex.org/W6635485671"],"related_works":["https://openalex.org/W2920874691","https://openalex.org/W2766864291","https://openalex.org/W2762356698","https://openalex.org/W2186505934","https://openalex.org/W2188814192","https://openalex.org/W143204455","https://openalex.org/W2114705216","https://openalex.org/W2127561726","https://openalex.org/W2377491601","https://openalex.org/W2361862789"],"abstract_inverted_index":{"First":[0],"designed":[1],"to":[2,6,10,26,85,108,126,136,153,170],"enable":[3],"private":[4],"networks":[5,159],"be":[7,168],"opened":[8],"up":[9],"the":[11,18,39,42,128,146,154,157,176],"outside":[12],"world":[13],"in":[14,38,134],"a":[15,31,48,90,98,123,138],"secure":[16],"way,":[17],"growing":[19],"complexity":[20],"of":[21,41,68,89,130,145,156,175],"organizations":[22],"make":[23,45],"firewalls":[24,131],"indispensable":[25],"control":[27],"information":[28,44],"flow":[29],"within":[30],"company.":[32],"The":[33,66,143],"central":[34],"role":[35],"they":[36],"hold":[37],"security":[40,141,173,177],"organization":[43],"their":[46],"management":[47],"critical":[49],"task":[50],"and":[51,63,94,117,160,164],"that":[52,103],"is":[53],"why":[54],"for":[55],"years":[56],"many":[57],"works":[58],"have":[59],"focused":[60],"on":[61],"checking":[62],"analyzing":[64],"firewalls.":[65],"composition":[67,129],"firewalls,":[69],"taking":[70],"into":[71],"account":[72],"routing":[73],"rules,":[74,96],"has":[75],"nevertheless":[76],"often":[77],"been":[78],"neglected.":[79],"In":[80],"this":[81],"paper,":[82],"we":[83],"propose":[84,122],"specify":[86],"all":[87],"components":[88],"firewall,":[91],"ie":[92],"filtering":[93],"translation":[95],"as":[97,113],"rewrite":[99,148],"system.":[100],"We":[101,120],"show":[102],"such":[104,112],"specifications":[105],"allow":[106],"us":[107],"handle":[109],"usual":[110],"problems":[111],"comparison,":[114],"structural":[115],"analysis":[116],"query":[118],"analysis.":[119],"also":[121],"formal":[124],"way":[125],"describe":[127],"(including":[132],"routing)":[133],"order":[135],"build":[137],"whole":[139],"network":[140],"policy.":[142],"properties":[144,155,174],"obtained":[147],"system":[149],"are":[150],"strongly":[151],"related":[152],"specified":[158],"thus,":[161],"classical":[162],"theoretical":[163],"practical":[165],"tools":[166],"can":[167],"used":[169],"obtain":[171],"relevant":[172],"policies.":[178]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
