{"id":"https://openalex.org/W2412087468","doi":"https://doi.org/10.1145/2914642.2914646","title":"Tri-Modularization of Firewall Policies","display_name":"Tri-Modularization of Firewall Policies","publication_year":2016,"publication_date":"2016-06-06","ids":{"openalex":"https://openalex.org/W2412087468","doi":"https://doi.org/10.1145/2914642.2914646","mag":"2412087468"},"language":"en","primary_location":{"id":"doi:10.1145/2914642.2914646","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2914642.2914646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063727322","display_name":"Hai\u2010Ning Chen","orcid":"https://orcid.org/0000-0003-0104-8498"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haining Chen","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070136662","display_name":"Omar Chowdhury","orcid":"https://orcid.org/0000-0002-1356-6279"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omar Chowdhury","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101471208","display_name":"Ninghui Li","orcid":"https://orcid.org/0000-0001-8207-9717"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ninghui Li","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023532960","display_name":"Warut Khern-am-nuai","orcid":"https://orcid.org/0000-0002-1028-1593"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Warut Khern-am-nuai","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048460582","display_name":"Suresh T. Chari","orcid":"https://orcid.org/0000-0002-3924-0971"},"institutions":[{"id":"https://openalex.org/I4210114115","display_name":"IBM Research - Thomas J. Watson Research Center","ror":"https://ror.org/0265w5591","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suresh Chari","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I4210114115"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040348286","display_name":"Ian Molloy","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114115","display_name":"IBM Research - Thomas J. Watson Research Center","ror":"https://ror.org/0265w5591","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ian Molloy","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I4210114115"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101438262","display_name":"Youngja Park","orcid":"https://orcid.org/0000-0002-4579-9261"},"institutions":[{"id":"https://openalex.org/I4210114115","display_name":"IBM Research - Thomas J. Watson Research Center","ror":"https://ror.org/0265w5591","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Youngja Park","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I4210114115"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5063727322"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.3153,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55284935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.9144085645675659},{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.9063390493392944},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7795790433883667},{"id":"https://openalex.org/keywords/modular-programming","display_name":"Modular programming","score":0.7714265584945679},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6064743399620056},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.5967691540718079},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.46959152817726135},{"id":"https://openalex.org/keywords/legacy-system","display_name":"Legacy system","score":0.45231810212135315},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40889737010002136},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.329325795173645},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.20587873458862305},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.18071258068084717},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08593830466270447}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.9144085645675659},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.9063390493392944},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7795790433883667},{"id":"https://openalex.org/C88482812","wikidata":"https://www.wikidata.org/wiki/Q6453666","display_name":"Modular programming","level":2,"score":0.7714265584945679},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6064743399620056},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.5967691540718079},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.46959152817726135},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.45231810212135315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40889737010002136},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.329325795173645},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.20587873458862305},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.18071258068084717},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08593830466270447},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2914642.2914646","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2914642.2914646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5493801248","display_name":null,"funder_award_id":"H98230-14-C-0139","funder_id":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency"}],"funders":[{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W40144721","https://openalex.org/W188713382","https://openalex.org/W1506285740","https://openalex.org/W1574020884","https://openalex.org/W1894272157","https://openalex.org/W1923195206","https://openalex.org/W1973917827","https://openalex.org/W1974548037","https://openalex.org/W1982255089","https://openalex.org/W1985021481","https://openalex.org/W2002596950","https://openalex.org/W2014254858","https://openalex.org/W2042448840","https://openalex.org/W2043170544","https://openalex.org/W2043978338","https://openalex.org/W2054075152","https://openalex.org/W2066338533","https://openalex.org/W2096050295","https://openalex.org/W2096244038","https://openalex.org/W2107801860","https://openalex.org/W2120255160","https://openalex.org/W2122106619","https://openalex.org/W2124209077","https://openalex.org/W2126945610","https://openalex.org/W2131999424","https://openalex.org/W2135292514","https://openalex.org/W2135870733","https://openalex.org/W2138623315","https://openalex.org/W2140073547","https://openalex.org/W2141335864","https://openalex.org/W2147983543","https://openalex.org/W2148408186","https://openalex.org/W2148656332","https://openalex.org/W2161129850","https://openalex.org/W2163328802","https://openalex.org/W2171863372","https://openalex.org/W2913256667"],"related_works":["https://openalex.org/W2042688990","https://openalex.org/W2389863504","https://openalex.org/W2785784743","https://openalex.org/W2916429898","https://openalex.org/W2366805216","https://openalex.org/W2327318552","https://openalex.org/W2359956462","https://openalex.org/W2373690040","https://openalex.org/W7781076","https://openalex.org/W2389411441"],"abstract_inverted_index":{"Firewall":[0],"policies":[1,30,99,118],"are":[2,31],"notorious":[3],"for":[4,75,82,95],"having":[5],"misconfiguration":[6],"errors":[7],"which":[8,56],"can":[9],"defeat":[10],"its":[11],"intended":[12],"purpose":[13],"of":[14,50,60,78,112,126],"protecting":[15],"hosts":[16],"in":[17,43,101],"the":[18,58,79,110],"network":[19],"from":[20,37,122],"malicious":[21],"users.":[22],"We":[23,72,88],"believe":[24],"this":[25,44],"is":[26],"because":[27],"today's":[28],"firewall":[29,62,86,98],"mostly":[32],"monolithic.":[33],"Inspired":[34],"by":[35],"ideas":[36],"modular":[38],"programming":[39],"and":[40,54,68],"code":[41],"refactoring,":[42],"work":[45],"we":[46,128],"introduce":[47],"three":[48,80],"kinds":[49],"modules:":[51],"primary,":[52],"auxiliary,":[53],"template,":[55],"facilitate":[57],"refactoring":[59],"a":[61,83],"policy":[63],"into":[64],"smaller,":[65],"reusable,":[66],"comprehensible,":[67],"more":[69],"manageable":[70],"components.":[71],"present":[73],"algorithms":[74],"generating":[76],"each":[77],"modules":[81],"given":[84],"legacy":[85,97],"policy.":[87],"also":[89],"develop":[90],"ModFP,":[91,113],"an":[92],"automated":[93],"tool":[94],"converting":[96],"represented":[100],"access":[102],"control":[103],"list":[104],"to":[105,124,131],"their":[106],"modularized":[107],"format.":[108],"With":[109],"help":[111],"when":[114],"examining":[115],"several":[116],"real-world":[117],"with":[119],"sizes":[120],"ranging":[121],"dozens":[123],"hundreds":[125],"rules,":[127],"were":[129],"able":[130],"identify":[132],"subtle":[133],"errors.":[134]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
