P. Adão, C. Bozzato, G. Dei-rossi, R. Focardi, and F. L. Luccio, Mignis: A Semantic Based Tool for Firewall Configuration, 2014 IEEE 27th Computer Security Foundations Symposium, pp.351-365, 2014.
DOI : 10.1109/CSF.2014.32

E. Shaer and H. Hamed, Firewall policy advisor for anomaly discovery and rule editing, Integrated Network Management IFIP Conference Proceedings, pp.17-30, 2003.

E. Al-shaer, H. Hamed, R. Boutaba, and M. Hasan, Conflict classification and analysis of distributed firewall policies, IEEE Journal on Selected Areas in Communications, vol.23, issue.10, pp.2069-2084, 2005.
DOI : 10.1109/JSAC.2005.854119

G. Birkhoff, Lattice Theory. Volume XXV of, 1967.

A. D. Brucker, L. Brügger, and B. Wolff, Formal firewall conformance testing: an application of test and proof techniques, Software Testing, Verification and Reliability, vol.220, issue.1, pp.34-71, 2015.
DOI : 10.1016/j.entcs.2008.11.003

URL : https://hal.archives-ouvertes.fr/hal-01213717

M. Cotton and L. Vegoda, Special Use IPv4 Addresses, RFC, vol.5735, 2010.
DOI : 10.17487/rfc5735

F. Cuppens, N. Cuppens-boulahia, and J. García-alfaro, Detection and removal of firewall misconfiguration, Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security, pp.154-162, 2005.

F. Cuppens, N. Cuppens-boulahia, T. Sans, and A. , Mì ege. A formal approach to specify and deploy a network security policy, Formal Aspects in Security and Trust, pp.203-218, 2005.

W. M. Fitzgerald, U. Neville, and S. N. Foley, MASON: Mobile autonomic security for network access controls, Journal of Information Security and Applications, vol.18, issue.1, pp.14-29, 2013.
DOI : 10.1016/j.jisa.2013.08.001

S. N. Foley, The specification and implementation of ???commercial??? security requirements including dynamic segregation of duties, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.125-134, 1997.
DOI : 10.1145/266420.266447

S. N. Foley and U. Neville, A firewall algebra for OpenStack, 2015 IEEE Conference on Communications and Network Security (CNS), pp.541-549, 2015.
DOI : 10.1109/CNS.2015.7346867

A. Hari, S. Suri, and G. Parulkar, Detecting and resolving packet filter conflicts, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.1203-1212, 2000.
DOI : 10.1109/INFCOM.2000.832496

J. L. Jacob, The Varieties of Refinement, Proceedings of the 4th Refinement Workshop, pp.441-455, 1991.
DOI : 10.1007/978-1-4471-3756-6_19

S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

Y. Jarraya, A. Eghtesadi, M. Debbabi, Y. Zhang, and M. Pourzandi, Cloud calculus: Security verification in elastic cloud computing platform, 2012 International Conference on Collaboration Technologies and Systems (CTS), pp.447-454, 2012.
DOI : 10.1109/CTS.2012.6261089

A. Jeffrey and T. Samak, Model Checking Firewall Policy Configurations, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.60-67, 2009.
DOI : 10.1109/POLICY.2009.32

L. Levine, Lemma 3, Example 6.) Algebraic Combinatorics, 2011.

J. M. Spivey, The Z Notation: A Reference Manual, Series in Computer Science, 1992.

L. Yuan, H. Chen, J. Mai, C. Chuah, Z. Su et al., Fireman: A toolkit for firewall modeling and analysis, Security and Privacy, pp.15-213, 2006.

H. Zhao and S. M. Bellovin, Policy algebras for hybrid firewalls, 2007.