Modeling and Management of Firewall Policies. Network and Service Management, IEEE Transactions on, vol.1, issue.1, pp.2-10, 2004. ,
A Proposed Preventive Information Security System, 2007 International Conference on Electrical Engineering, pp.1-6, 2007. ,
DOI : 10.1109/ICEE.2007.4287288
Fast and Scalable Conflict Detection for Packet Classifiers, ICNP, pp.270-279, 2002. ,
DOI : 10.1016/s1389-1286(03)00213-5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.625
A survey of longest common subsequence algorithms, Proceedings Seventh International Symposium on String Processing and Information Retrieval. SPIRE 2000, p.39, 2000. ,
DOI : 10.1109/SPIRE.2000.878178
ICSA Firewall Policy Guide v2.0, 1997. ,
Permutation Editing and Matching via Embeddings, ICALP, pp.481-492, 2001. ,
DOI : 10.1007/3-540-48224-5_40
Securing systems with host-based firewalls, Sun BluePrints Online, 2001. ,
Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.320-327, 2004. ,
DOI : 10.1109/ICDCS.2004.1281597
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1042
Dynamic rule-ordering optimization for high-speed firewall filtering, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.332-342, 2006. ,
DOI : 10.1145/1128817.1128867
Guidelines on Firewalls and Firewall Policy, NIST Recommendations, pp.800-841, 2008. ,
Change-impact analysis of firewall policies, ESORICS, pp.155-170, 2007. ,
ACLA: A framework for Access Control List (ACL) Analysis and Optimization, booktitle = Proceedings of the IFIP TC6, TC11 International Conference on Communications and Multimedia Security Issues of the New Century. page 4, 2001. ,
Fast firewall implementations for software and hardwarebased routers, International Conference on Network Protocols, pp.155-170, 2001. ,
Analysis of the SSL 3.0 protocol, WOEC'96: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, pp.4-4, 1996. ,
SSH: secure login connections over the internet, SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, pp.4-4, 1996. ,
On the Safety and Efficiency of Firewall Policy Deployment, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.33-50, 2007. ,
DOI : 10.1109/SP.2007.32
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4 ,
IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004. ,
BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399 ,