{"id":"https://openalex.org/W2966492399","doi":"https://doi.org/10.1609/aaai.v33i01.33019398","title":"Remote Management of Boundary Protection Devices with Information Restrictions","display_name":"Remote Management of Boundary Protection Devices with Information Restrictions","publication_year":2019,"publication_date":"2019-07-17","ids":{"openalex":"https://openalex.org/W2966492399","doi":"https://doi.org/10.1609/aaai.v33i01.33019398","mag":"2966492399"},"language":"en","primary_location":{"id":"doi:10.1609/aaai.v33i01.33019398","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v33i01.33019398","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/4988/4861","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/4988/4861","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063568782","display_name":"Aaron Adler","orcid":"https://orcid.org/0000-0002-7592-0763"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aaron Adler","raw_affiliation_strings":["BBN Technologies"],"affiliations":[{"raw_affiliation_string":"BBN Technologies","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030654216","display_name":"Peter Samouelian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peter Samouelian","raw_affiliation_strings":["BBN Technologies"],"affiliations":[{"raw_affiliation_string":"BBN Technologies","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086656395","display_name":"Michael Atighetchi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael Atighetchi","raw_affiliation_strings":["BBN Technologies"],"affiliations":[{"raw_affiliation_string":"BBN Technologies","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080219606","display_name":"Yat Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yat Fu","raw_affiliation_strings":["U.S. Air Force Research Laboratory"],"affiliations":[{"raw_affiliation_string":"U.S. Air Force Research Laboratory","institution_ids":["https://openalex.org/I1280414376"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063568782"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3677,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64282178,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"33","issue":"01","first_page":"9398","last_page":"9403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5677337050437927},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5610640048980713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5294598937034607},{"id":"https://openalex.org/keywords/configuration-management","display_name":"Configuration Management (ITSM)","score":0.523850679397583},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5219616293907166},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.5178899765014648},{"id":"https://openalex.org/keywords/blueprint","display_name":"Blueprint","score":0.4884856939315796},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4832618832588196},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4817526340484619},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.4798269271850586},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4551612436771393},{"id":"https://openalex.org/keywords/boundary","display_name":"Boundary (topology)","score":0.44663023948669434},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.37381622195243835},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.35500237345695496},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1714111566543579}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5677337050437927},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5610640048980713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5294598937034607},{"id":"https://openalex.org/C78873551","wikidata":"https://www.wikidata.org/wiki/Q5160111","display_name":"Configuration Management (ITSM)","level":2,"score":0.523850679397583},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5219616293907166},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.5178899765014648},{"id":"https://openalex.org/C155911762","wikidata":"https://www.wikidata.org/wiki/Q422321","display_name":"Blueprint","level":2,"score":0.4884856939315796},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4832618832588196},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4817526340484619},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.4798269271850586},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4551612436771393},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.44663023948669434},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.37381622195243835},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.35500237345695496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1714111566543579},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v33i01.33019398","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v33i01.33019398","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/4988/4861","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v33i01.33019398","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v33i01.33019398","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/4988/4861","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2966492399.pdf","grobid_xml":"https://content.openalex.org/works/W2966492399.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W1984012539","https://openalex.org/W2079967994","https://openalex.org/W2123541516","https://openalex.org/W6670434813"],"related_works":["https://openalex.org/W2384575798","https://openalex.org/W2265189214","https://openalex.org/W2766654718","https://openalex.org/W2007211730","https://openalex.org/W2379378785","https://openalex.org/W345637833","https://openalex.org/W2359853023","https://openalex.org/W73348314","https://openalex.org/W1971312788","https://openalex.org/W2285100693"],"abstract_inverted_index":{"Boundary":[0],"Protection":[1],"Devices":[2],"(BPDs)":[3],"are":[4,175],"used":[5],"by":[6,148],"US":[7],"Government":[8],"mission":[9],"partners":[10],"to":[11,84,108,169],"regulate":[12],"the":[13,117,138,189],"flow":[14],"of":[15,19,140,188],"information":[16],"across":[17,113],"networks":[18],"differing":[20],"security":[21,42,85],"levels.":[22],"BPDs":[23,141,157],"provide":[24],"several":[25],"critical":[26,44],"functions,":[27],"including":[28],"preventing":[29,35],"unauthorized":[30],"sharing,":[31],"sanitizing":[32],"information,":[33],"and":[34,43,67,74,120,127,146,150,203],"cyber":[36],"attacks.":[37],"Their":[38,90],"application":[39,109],"in":[40,179],"national":[41],"infrastructure":[45],"environments":[46],"(e.g.,":[47],"military":[48],"missions,":[49],"nuclear":[50],"power":[51],"plants,":[52],"clean":[53],"water":[54],"distribution":[55],"systems)":[56],"calls":[57],"for":[58,100],"a":[59,161,198],"comprehensive":[60],"load":[61,102],"monitoring":[62],"system":[63,79],"that":[64,80,105,123,136],"provides":[65],"resilience":[66],"scalability,":[68],"as":[69,71,92,186],"well":[70],"an":[72,204],"automated":[73],"vendor":[75],"neutral":[76],"configuration":[77,126,139,171],"management":[78,172],"can":[81,153],"efficiently":[82],"respond":[83],"threats":[86],"at":[87],"machine":[88],"speed.":[89],"design":[91],"one-way":[93],"traffic":[94],"control":[95],"systems,":[96],"however,":[97],"presents":[98,129],"challenges":[99,166,194],"dynamic":[101],"adaptation":[103,200],"techniques":[104,135],"require":[106],"access":[107],"server":[110],"performance":[111],"metrics":[112],"network":[114],"boundaries.":[115],"Moreover,":[116],"structured":[118],"review":[119],"approval":[121],"process":[122],"regulates":[124],"their":[125],"use":[128],"two":[130],"significant":[131],"challenges:":[132],"(1)":[133],"Adaptation":[134],"alter":[137],"must":[142],"be":[143,154],"predictable,":[144],"understandable,":[145],"pre-approved":[147],"administrators,":[149],"(2)":[151],"Software":[152],"installed":[155],"on":[156],"only":[158],"after":[159],"completing":[160],"stringent":[162],"accreditation":[163],"process.":[164],"These":[165],"often":[167],"lead":[168],"manual":[170],"practices,":[173],"which":[174],"inefficient":[176],"or":[177],"ineffective":[178],"many":[180],"cases.":[181],"The":[182],"Hammerhead":[183],"prototype,":[184],"developed":[185],"part":[187],"SHARC":[190],"project,":[191],"addresses":[192],"these":[193],"using":[195],"knowledge":[196],"representation,":[197],"rule-oriented":[199],"bundle":[201],"format,":[202],"extensible,":[205],"open-source":[206],"constraint":[207],"solver.":[208]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
