A survey on SDN programming languages: Toward a taxonomy

C Trois, MD Del Fabro, LCE de Bona… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Network devices have always been considered as configurable black boxes until the
emergence of software-defined networking (SDN). SDN enables the networks to be …

Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

Semantic-based automated reasoning for AWS access policies using SMT

J Backes, P Bolignano, B Cook… - … Formal Methods in …, 2018 - ieeexplore.ieee.org
Cloud computing provides on-demand access to IT resources via the Internet. Permissions
for these resources are defined by expressive access control policies. This paper presents a …

An operating system for the home

C Dixon, R Mahajan, S Agarwal, AJ Brush… - … USENIX Symposium on …, 2012 - usenix.org
Network devices for the home such as remotely controllable locks, lights, thermostats,
cameras, and motion sensors are now readily available and inexpensive. In theory, this …

Software-defined networking: Categories, analysis, and future directions

M Hussain, N Shah, R Amin, SS Alshamrani, A Alotaibi… - Sensors, 2022 - mdpi.com
Software-defined networking (SDN) is an innovative network architecture that splits the
control and management planes from the data plane. It helps in simplifying network …

SecPAL: Design and semantics of a decentralized authorization language

MY Becker, C Fournet… - Journal of Computer …, 2010 - content.iospress.com
We present a declarative authorization language. Policies and credentials are expressed
using predicates defined by logical clauses, in the style of constraint logic programming …

TrustBAC: integrating trust relationships into the RBAC model for access control in open systems

S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.
However, these models have often found to be inadequate for open and decentralized multi …

From datalog to flix: A declarative language for fixed points on lattices

M Madsen, MH Yee, O Lhoták - ACM SIGPLAN Notices, 2016 - dl.acm.org
We present Flix, a declarative programming language for specifying and solving least fixed
point problems, particularly static program analyses. Flix is inspired by Datalog and extends …

RT: A role-based trust-management framework

N Li, JC Mitchell - Proceedings DARPA Information …, 2003 - ieeexplore.ieee.org
The RT Role-based Trust-management framework provides policy language, semantics,
deduction engine, and pragmatic features such as application domain specification …

Dedalus: Datalog in Time and Space

P Alvaro, WR Marczak, N Conway… - Datalog Reloaded: First …, 2011 - Springer
Recent research has explored using Datalog-based languages to express a distributed
system as a set of logical invariants. Two properties of distributed systems proved difficult to …