Mignis: A Semantic Based Tool for Firewall Configuration, 2014 IEEE 27th Computer Security Foundations Symposium, pp.351-365, 2014. ,
DOI : 10.1109/CSF.2014.32
Firewall policy advisor for anomaly discovery and rule editing, Integrated Network Management IFIP Conference Proceedings, pp.17-30, 2003. ,
Conflict classification and analysis of distributed firewall policies, IEEE Journal on Selected Areas in Communications, vol.23, issue.10, pp.2069-2084, 2005. ,
DOI : 10.1109/JSAC.2005.854119
Lattice Theory. Volume XXV of, 1967. ,
Formal firewall conformance testing: an application of test and proof techniques, Software Testing, Verification and Reliability, vol.220, issue.1, pp.34-71, 2015. ,
DOI : 10.1016/j.entcs.2008.11.003
URL : https://hal.archives-ouvertes.fr/hal-01213717
Special Use IPv4 Addresses, RFC, vol.5735, 2010. ,
DOI : 10.17487/rfc5735
Detection and removal of firewall misconfiguration, Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security, pp.154-162, 2005. ,
Mì ege. A formal approach to specify and deploy a network security policy, Formal Aspects in Security and Trust, pp.203-218, 2005. ,
MASON: Mobile autonomic security for network access controls, Journal of Information Security and Applications, vol.18, issue.1, pp.14-29, 2013. ,
DOI : 10.1016/j.jisa.2013.08.001
The specification and implementation of ???commercial??? security requirements including dynamic segregation of duties, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.125-134, 1997. ,
DOI : 10.1145/266420.266447
A firewall algebra for OpenStack, 2015 IEEE Conference on Communications and Network Security (CNS), pp.541-549, 2015. ,
DOI : 10.1109/CNS.2015.7346867
Detecting and resolving packet filter conflicts, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.1203-1212, 2000. ,
DOI : 10.1109/INFCOM.2000.832496
The Varieties of Refinement, Proceedings of the 4th Refinement Workshop, pp.441-455, 1991. ,
DOI : 10.1007/978-1-4471-3756-6_19
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
Cloud calculus: Security verification in elastic cloud computing platform, 2012 International Conference on Collaboration Technologies and Systems (CTS), pp.447-454, 2012. ,
DOI : 10.1109/CTS.2012.6261089
Model Checking Firewall Policy Configurations, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.60-67, 2009. ,
DOI : 10.1109/POLICY.2009.32
Lemma 3, Example 6.) Algebraic Combinatorics, 2011. ,
The Z Notation: A Reference Manual, Series in Computer Science, 1992. ,
Fireman: A toolkit for firewall modeling and analysis, Security and Privacy, pp.15-213, 2006. ,
Policy algebras for hybrid firewalls, 2007. ,