Coots, J. F. and Gillespie, H. (1934). Santa Claus is Comin’
to Town. Leo Feist Pub 6752-4, NY.
Cranor, L., Langheinrich, M., Marchiori, M., Presler-
Marshall, M., and Reagle, J. (2002). The platform
for privacy preferences (P3P1. 0) specification. W3C.
Di Vimercati, S., Foresti, S., Jajodia, S., and Samarati, P.
(2007a). Access control policies and languages in
open environments. In Secure Data Management in
Decentralized Systems, pages 21–58. Springer.
Di Vimercati, S., Foresti, S., Samarati, P., and Jajodia,
S. (2007b). Access control policies and languages.
IJCSE, 3(2):94–102.
Endres, A. (1975). An analysis of errors and their causes
in system programs. In ACM SIGPLAN Notices, vol-
ume 10, pages 327–336.
Feamster, N., Balakrishnan, H., Rexford, J., Shaikh, A., and
Van Der Merwe, J. (2004). The case for separating
routing from routers. In ACM FDNA, pages 5–12.
Feamster, N., Rexford, J., and Zegura, E. (2013). The road
to SDN. Queue.
Gupta, M., Sommers, J., and Barford, P. (2013). Fast,
accurate simulation for SDN prototyping. In ACM
HotSDN, pages 31–36.
Hall, M. (2003). Understanding the file
system architecture in Windows CE
.NET, https://msdn.microsoft.com/en-
au/library/aa459155.aspx.
Han, W. (2012). A survey on policy languages in network
and security management. pages 477–489. Elsevier.
Jackson, D. (2011). Software Abstractions: Logic, Lan-
guage, and Analysis. The MIT Press.
Jajodia, S. and Samarati, P. (1997). A logical language for
expressing authorizations. In IEEE S&P, pages 31-42.
Kagal, L. (2002). Rei: a policy language for the Me-Centric
project. HP Labs.
Knight, S., Nguyen, H., Maennel, O., Phillips, I., Falkner,
N., Bush, R., and Roughan, M. (2013). An auto-
mated system for emulated network experimentation.
In ACM CoNEXT, pages 235–246.
Lakshman, T., Nandagopal, T., Ramjee, R., and Woo, T.
(2004). The softrouter architecture. ACM HotNets.
Libes, D. (1995). Exploring Expect: A Tcl-based toolkit for
automating interactive programs. O’Reilly.
Liu, A. X. and Gouda, M. G. (2008). Diverse firewall de-
sign. IEEE TPDS, pages 1237–1251.
Magedanz, T. and Popescu-Zeletin, R. (1996). Intelligent
Networks: Basic Technology, Standards and Evolu-
tion. Thompson Computer Press.
McKendrick, J. (2006). Another view:XML not meant to
be human readable, http://tinyurl.com/hytddnt.
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,
G., Peterson, L., Rexford, J., Shenker, S., and Turner,
J. (2008). OpenFlow: enabling innovation in campus
networks. ACM SIGCOMM CCR, 38(2):69–74.
OASIS (2016). OASIS Extensible Access Control Markup
Language (XACML) version 3.0.
Peterson, L., Anderson, T., Blumenthal, D., et al. (2006).
GENI: Global Environment for Network Innovations,
http://www.geni.net.
Prakash, C., Lee, J., Turner, Y., Kang, J.-M., Akella, A.,
Clark, C., Ma, Y., and Sharma, P. (2015). PGA: Using
graphs to express and automatically reconcile network
policies. In ACM SIGCOMM, pages 29-42.
Ranathunga, D., Roughan, M., Kernick, P., and Falkner, N.
(2015a). Towards standardising firewall reporting. In
WOS-CPS. Springer LNCS.
Ranathunga, D., Roughan, M., Kernick, P., and Falkner, N.
(2016). Malachite: Firewall policy comparison. In
IEEE ISCC.
Ranathunga, D., Roughan, M., Kernick, P., Falkner, N., and
Nguyen, H. (2015b). Identifying the missing aspects
of the ANSI/ISA best practices for security policy. In
ACM CPSS, pages 37–48.
Reich, J., Monsanto, C., Foster, N., Rexford, J., and Walker,
D. Modular SDN programming with Pyretic. Techni-
cal Report of USENIX, pages 40–47.
Rubin, A. D. and Geer, D. E. (1998). A survey of Web
security. IEEE Computer, pages 34–41.
Soul
´
e, R., Basu, S., Marandi, P. J., Pedone, F., Kleinberg,
R., Sirer, E. G., and Foster, N. (2014). Merlin: A
language for provisioning network resources. In ACM
CoNEXT, pages 213–226.
Stoneburner, G., Goguen, A. Y., and Feringa, A. (2002).
Risk management guide for information technology
systems. NIST Special Publication, 800(30).
Stouffer, K., Falco, J., and Scarfone, K. (2008). Guide to In-
dustrial Control Systems (ICS) security. NIST Special
Publication, 800(82).
Strassner, J. and Schleimer, S. (1998). Policy framework
definition language. Internet Draft, IETF.
Tao, H. (2005). A XACML-based access control model for
Web service. In IEEE WiCOM, pages 1140–1144.
Tennenhouse, D. L., Smith, J. M., Wetherall, D. J., and Min-
den, G. J. (1997). A survey of active network research.
IEEE Communications Magazine, (1):80–86.
Twidle, K., Dulay, N., Lupu, E., and Sloman, M. (2009).
Ponder2: A policy system for autonomous pervasive
environments. In ICAS, pages 330–335.
Vacante, R. C. and Houck, P. T. (2003). Testing of policy
prior to deployment in a policy-based network man-
agement system. US Patent 6,651,191.
Vahdat, A., Clark, D., and Rexford, J. (2015). A purpose-
built global network: Google’s move to SDN. Queue.
Verkaik, P., Pei, D., Scholl, T., Shaikh, A., Snoeren, A. C.,
and Van Der Merwe, J. E. (2007). Wresting control
from BGP: Scalable fine-grained route control. In
USENIX ATC, pages 295–308.
Verma, D. C. (2002). Simplifying network administra-
tion using policy-based management. IEEE Network,
16(2):20–26.
Wetherall, D. (1999). ANTS: network services without the
red tape. IEEE Computer, pages 42-48.
Wijnen, B. (2015). Intent Based Network Modeling (IB-
NEMO), http://tinyurl.com/h95ecfl.
Wool, A. (2004). A quantitative study of firewall configu-
ration errors. IEEE Computer, 37(6):62–67.
Verifiable Policy-defined Networking for Security Management
351