J. Network, S. Manager, E. Al-shaer, and H. Hamed, Modeling and Management of Firewall Policies. Network and Service Management, IEEE Transactions on, vol.1, issue.1, pp.2-10, 2004.

M. Anwar, M. Zafar, and Z. Ahmed, A Proposed Preventive Information Security System, 2007 International Conference on Electrical Engineering, pp.1-6, 2007.
DOI : 10.1109/ICEE.2007.4287288

F. Baboescu and G. Varghese, Fast and Scalable Conflict Detection for Packet Classifiers, ICNP, pp.270-279, 2002.
DOI : 10.1016/s1389-1286(03)00213-5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.625

L. Bergroth, H. Hakonen, and T. Raita, A survey of longest common subsequence algorithms, Proceedings Seventh International Symposium on String Processing and Information Retrieval. SPIRE 2000, p.39, 2000.
DOI : 10.1109/SPIRE.2000.878178

S. Cobb, ICSA Firewall Policy Guide v2.0, 1997.

G. Cormode, S. Muthukrishnan, and S. C. Sahinalp, Permutation Editing and Matching via Embeddings, ICALP, pp.481-492, 2001.
DOI : 10.1007/3-540-48224-5_40

M. Englund, Securing systems with host-based firewalls, Sun BluePrints Online, 2001.

M. G. Gouda and A. X. Liu, Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.320-327, 2004.
DOI : 10.1109/ICDCS.2004.1281597

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1042

H. Hamed and E. , Dynamic rule-ordering optimization for high-speed firewall filtering, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.332-342, 2006.
DOI : 10.1145/1128817.1128867

S. Karen and H. Paul, Guidelines on Firewalls and Firewall Policy, NIST Recommendations, pp.800-841, 2008.

A. X. Liu, Change-impact analysis of firewall policies, ESORICS, pp.155-170, 2007.

J. Qian, ACLA: A framework for Access Control List (ACL) Analysis and Optimization, booktitle = Proceedings of the IFIP TC6, TC11 International Conference on Communications and Multimedia Security Issues of the New Century. page 4, 2001.

L. Qiu, G. Varghese, and S. Suri, Fast firewall implementations for software and hardwarebased routers, International Conference on Network Protocols, pp.155-170, 2001.

D. Wagner and B. Schneier, Analysis of the SSL 3.0 protocol, WOEC'96: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, pp.4-4, 1996.

T. Ylönen, SSH: secure login connections over the internet, SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, pp.4-4, 1996.

C. C. Zhang, M. Winslett, and C. A. Gunter, On the Safety and Efficiency of Firewall Policy Deployment, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.33-50, 2007.
DOI : 10.1109/SP.2007.32

L. Unité-de-recherche-inria-lorraine, Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4

I. Unité-de-recherche and . Rennes, IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004.

I. De-voluceau-rocquencourt, BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399