Network Innovation using OpenFlow: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.493-511, 2014. ,
DOI : 10.1109/SURV.2013.081313.00105
URL : http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1164&context=csetechreports
Ponderflow: A policy specification language for openflow networks, The Thirteenth International Conference on Networks, pp.204-209, 2014. ,
EnforSDN: Network policies enforcement with SDN, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.80-88, 2015. ,
DOI : 10.1109/INM.2015.7140279
Security in service level agreements for cloud computing, pp.636-642, 2011. ,
Towards automated negotiation of access control policies, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.111-119, 2003. ,
DOI : 10.1109/POLICY.2003.1206965
Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pp.183-194, 2015. ,
DOI : 10.1007/978-3-642-27180-9_70
Semiring-based csps and valued csps: Frameworks, properties, and comparison, Constraints, vol.4, issue.3, pp.199-240, 1999. ,
DOI : 10.1023/A:1026441215081
Attribute based access control models, Prikladnaya Diskretnaya Matematika. Supplement pp, pp.79-82, 2012. ,
The Ponder Policy Specification Language, Policies for Distributed Systems and Networks, pp.18-38, 2001. ,
DOI : 10.1007/3-540-44569-2_2
Relationship-based access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.191-202, 2011. ,
DOI : 10.1145/1943513.1943539
On the negotiation of access control policies, International Workshop on Security Protocols, pp.188-201, 2001. ,
OpenFlow Deployment and Concept Analysis, Advances in Electrical and Electronic Engineering, vol.11, issue.5, p.327, 2013. ,
DOI : 10.15598/aeee.v11i5.884
URL : https://doi.org/10.15598/aeee.v11i5.884
FLOWGUARD, Proceedings of the third workshop on Hot topics in software defined networking, HotSDN '14, pp.97-102, 2014. ,
DOI : 10.1145/2620728.2620749
Datalog and emerging applications, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.1213-1216, 2011. ,
DOI : 10.1145/1989323.1989456
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Software Defined networking based routing firewall, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp.267-269, 2016. ,
DOI : 10.1109/ICCTICT.2016.7514590
OpenSec: Policy-Based Security Using Software-Defined Networking, IEEE Transactions on Network and Service Management, vol.13, issue.1, pp.30-42, 2016. ,
DOI : 10.1109/TNSM.2016.2517407
Automating Resource Selection and Configuration in Inter-clouds through a Software Product Line Method, 2015 IEEE 8th International Conference on Cloud Computing, pp.2015-726, 2015. ,
DOI : 10.1109/CLOUD.2015.101
URL : https://hal.archives-ouvertes.fr/hal-01252985
Reaching Agreement in Security Policy Negotiation, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.98-105, 2014. ,
DOI : 10.1109/TrustCom.2014.17
URL : https://hal.archives-ouvertes.fr/hal-01159836
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud, IFIP International Information Security and Privacy Conference, pp.105-118, 2016. ,
DOI : 10.1007/978-3-319-33630-5_8
URL : https://hal.archives-ouvertes.fr/hal-01369546
Similarity Measure for Security Policies in Service Provider Selection, International Conference on Information Systems Security, pp.227-242, 2015. ,
DOI : 10.1109/TrustCom.2014.17
URL : https://hal.archives-ouvertes.fr/hal-01392794
Policy Negotiation for Co-owned Resources in Relationship-Based Access Control, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT '16, pp.125-136, 2016. ,
DOI : 10.1145/605434.605435
Policy based resource allocation in IaaS cloud, Future Generation Computer Systems, vol.28, issue.1, pp.94-103, 2012. ,
DOI : 10.1016/j.future.2011.05.016
Extending networking into the virtualization layer, p.Hotnets, 2009. ,
The design and implementation of open vswitch, pp.117-130, 2015. ,
extensible access control markup language (xacml) version 3.0 (committe specification 01). Tech. rep, OASIS, 2010. ,
An approach for privacy policies negotiation in mobile health-Cloud environments, 2015 International Conference on Cloud Technologies and Applications (CloudTech), pp.1-6, 2015. ,
DOI : 10.1109/CloudTech.2015.7336983
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Analysis of Software Defined Network firewall (SDF), 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp.228-231, 2016. ,
DOI : 10.1109/WiSPNET.2016.7566125
Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?, 2012 20th IEEE international conference on network protocols (ICNP), pp.1-6, 2012. ,
Fresco: Modular composable security services for software-defined networks, p.NDSS, 2013. ,
Automatic belief network modeling via policy inference for SDN fault localization, Journal of Internet Services and Applications, vol.5, issue.1, p.1, 2016. ,
DOI : 10.1145/2619239.2626304
URL : https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-016-0043-y?site=jisajournal.springeropen.com
Access control policy negotiation for remote hotdeployed grid services, First International Conference on e-Science and Grid Computing (e-Science'05, p.9, 2005. ,
A Proactive Stateful Firewall for Software Defined Networking, Risks and Security of Internet and Systems - 11th International Conference, pp.123-138, 2016. ,
DOI : 10.1145/2602204.2602211
URL : https://hal.archives-ouvertes.fr/hal-01411346
Software Defined Networking Reactive Stateful Firewall, ICT Systems Security and Privacy Protection -31st IFIP TC 11 International Conference Proceedings. pp, pp.119-132, 2016. ,
DOI : 10.1007/978-3-319-33630-5_9
URL : https://hal.archives-ouvertes.fr/hal-01333445