
Esteves, B. and Rodr
´
ıguez-Doncel, V. (2024). Analysis of
ontologies and policy languages to represent informa-
tion flows in gdpr. Semantic Web, 15(3):709–743.
European Parliament and Council of the European
Union (2016). Regulation (EU) 2016/679 of
the European Parliament and of the Council.
https://data.europa.eu/eli/reg/2016/679/oj.
Fan, B., Andersen, D. G., Kaminsky, M., and Mitzen-
macher, M. D. (2014). Cuckoo filter: Practically better
than bloom. In Proceedings of the 10th ACM Interna-
tional on Conference on emerging Networking Exper-
iments and Technologies, pages 75–88.
Gama, O., Figueiredo, C., Carvalho, P., and Mendes, P.
(2007). Towards a reconfigurable wireless sensor net-
work for biomedical applications. In 2007 Interna-
tional Conference on Sensor Technologies and Ap-
plications (SENSORCOMM 2007), pages 490–495.
IEEE.
Glaeser, N. and Wang, A. (2016). Access control for a
database-defined network.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98.
Karmakar, K. K., Varadharajan, V., Tupakula, U., and
Hitchens, M. (2020). Towards a dynamic policy en-
hanced integrated security architecture for sdn infras-
tructure. In NOMS 2020-2020 IEEE/IFIP Network
Operations and Management Symposium, pages 1–9.
IEEE.
Makin, L. T. (2024). The logic of deontic operators. Oxford
Studies in Metaethics, Volume 19, 19:349.
Maleh, Y., Qasmaoui, Y., El Gholami, K., Sadqi, Y.,
and Mounir, S. (2023). A comprehensive survey on
sdn security: threats, mitigations, and future direc-
tions. Journal of Reliable Intelligent Environments,
9(2):201–239.
Markopoulou, A., Iannaccone, G., Bhattacharyya, S.,
Chuah, C.-N., and Diot, C. (2004). Characteriza-
tion of failures in an ip backbone. In INFOCOM
2004. Twenty-third AnnualJoint Conference of the
IEEE Computer and Communications Societies, vol-
ume 4, pages 2307–2317. IEEE.
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,
G., Peterson, L., Rexford, J., Shenker, S., and Turner,
J. (2008). Openflow: enabling innovation in campus
networks. ACM SIGCOMM Computer Communica-
tion Review, 38(2):69–74.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and
Jamalipour, A. (2014). Wireless body area networks:
A survey. IEEE Communications surveys & tutorials,
16(3):1658–1686.
Olivieri, F., Governatori, G., Cristani, M., Rotolo, A., and
Sattar, A. (2024). Deontic meta-rules. Journal of
Logic and Computation, 34(2):261–314.
Olszewski, M., Parent, X., and Van der Torre, L. (2024).
Permissive and regulative norms in deontic logic.
Journal of Logic and Computation, 34(4):728–763.
Ortalo, R. (1996). Using deontic logic for security policy
specification. LAAS report, 96380.
RAVEL (2024). Ravel Walkthrough. Last accessed: 21
June, 2024.
Shi, Y., Dai, F., and Ye, Z. (2017). An enhanced se-
curity framework of software defined network based
on attribute-based encryption. In 2017 4th Interna-
tional Conference on Systems and Informatics (IC-
SAI), pages 965–969. IEEE.
Sivarajan, E. and Jeyalakshmi, V. (2024). Attributes
based access control mechanism using smart contracts
against denial of service attacks in sdn. In AIP Con-
ference Proceedings, volume 3149:1. AIP Publishing.
Smith, L. M., Zhu, L., Lerman, K., and Percus, A. G.
(2016). Partitioning networks with node attributes by
compressing information flow. ACM Transactions on
Knowledge Discovery from Data (TKDD), 11(2):1–
26.
Steiner, J. G., Neuman, B. C., and Schiller, J. I. (1988).
Kerberos: An authentication service for open network
systems. In Usenix Winter, pages 191–202.
Van Benthem, J. and Bergstra, J. (1994). Logic of transition
systems. Journal of Logic, Language and Informa-
tion, 3:247–283.
Varadharajan, V., Karmakar, K., Tupakula, U., and
Hitchens, M. (2019). A policy-based security ar-
chitecture for software-defined networks. IEEE
Transactions on Information Forensics and Security,
14(4):897–912.
Von Wright, G. H. (1951). Deontic logic. Mind, 60(237):1–
15.
Vyas, P. and Shyamasundar, R. (2021). Secsdn: A novel ar-
chitecture for a secure sdn. In SECRYPT, pages 587–
594.
Walid, R., Joshi, K. P., and Choi, S. G. (2024). Compari-
son of attribute-based encryption schemes in securing
healthcare systems. Scientific Reports, 14(1):7147.
Wang, A., Mei, X., Croft, J., Caesar, M., and Godfrey, B.
(2016). Ravel: A database-defined network. In Pro-
ceedings of the Symposium on SDN Research, SOSR
’16, pages 5:1–5:7, New York, NY, USA. ACM.
Yuan, E. and Tong, J. (2005). Attributed based access con-
trol (abac) for web services. In IEEE International
Conference on Web Services (ICWS’05). IEEE.
Zhang, L., Xie, S., Wu, Q., and Rezaeibagha, F. (2024).
Enhanced secure attribute-based dynamic data sharing
scheme with efficient access policy hiding and policy
updating for iomt. IEEE Internet of Things Journal.
Zhu, X., Chang, C., Xi, Q., and Zuo, Z. (2020). Attribute-
guard: Attribute-based flow access control framework
in software-defined networking. Security and Com-
munication Networks, 2020(1):6302739.
APPENDIX
The research presented in this paper is partly funded
by Innovate UK/Eureka CELTIC project ADA (award
number 10098971).
A Deontic Logic Model of Attribute-Based Information Flows in Database-Defined Networks with Application to Healthcare Monitoring
341