T. Abbes, A. Bouhoula, and M. Rusinowitch, An inference system for detecting firewall filtering rules anomalies, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2122-2128, 2008.
DOI : 10.1145/1363686.1364197

URL : https://hal.archives-ouvertes.fr/inria-00329730

E. Al-shaer, H. Hamed, R. Boutaba, and M. Hasan, Conflict classification and analysis of distributed firewall policies, IEEE Journal on Selected Areas in Communications, vol.23, issue.10, pp.2069-2084, 2005.
DOI : 10.1109/JSAC.2005.854119

T. Aoto, J. Yoshida, and Y. Toyama, Proving Confluence of Term Rewriting Systems Automatically, Rewriting Techniques and Applications, pp.93-102, 2009.
DOI : 10.1006/jsco.1994.1003

F. Baader and T. Nipkow, Term rewriting and all that, 1998.

E. Balland, P. Brauner, R. Kopetz, P. Moreau, and A. Reilles, Tom: Piggybacking Rewriting on Java, Rewriting Techniques and Applications, pp.36-47, 2007.
DOI : 10.1007/978-3-540-73449-9_5

URL : https://hal.archives-ouvertes.fr/inria-00142045

A. Benelbahri and A. Bouhoula, Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules, 2007 IEEE Symposium on Computers and Communications, pp.63-70, 2007.
DOI : 10.1109/ISCC.2007.4381486

C. Moreau and . Ringeissen, An overview of elan. Electronic Notes in Th, Comp. Sci, vol.15, pp.329-344, 1998.
URL : https://hal.archives-ouvertes.fr/inria-00098518

B. Conoboy and E. Fictner, Ip filter based firewalls howto Available on: http://www.obfuscation.org/ipf/ipf-howto.pdf A3PAT, an approach for certified automated termination proofs, ACM SIGPLAN Work. on Partial evaluation and program manipulation, pp.63-72, 2002.

F. Cuppens, N. Cuppens-boulahia, and J. Garcia-alfaro, Detection and removal of firewall misconfiguration, Intl Conf. on Communication, Network and Information Security, 2005.

F. Cuppens, N. Cuppens-boulahia, and J. Garcia-alfaro, Detection of network security component misconfiguration by rewriting and correlation, Joint Conf. on Security in network ARchitectures and Security of Information Systems, 2006.

F. Durán and J. Meseguer, A Church-Rosser Checker Tool for Conditional Order-Sorted Equational Maude Specifications, pp.69-85, 2010.
DOI : 10.1007/978-3-642-16310-4_6

I. Durand, Autowrite: A tool for term rewrite systems and tree automata Electronic Notes in Th, Comp. Sci, vol.124, issue.2, pp.29-49, 2005.

P. Eronen and J. Zitting, An expert system for analyzing firewall rules, Nordic Work. on Secure IT Systems, pp.100-107, 2001.

G. Feuillade, T. Genet, V. Viet-triem, and . Tong, Reachability Analysis over Term Rewriting Systems, Journal of Automated Reasoning, vol.37, issue.1?2, pp.341-383, 2004.
DOI : 10.1007/s10817-004-6246-0

URL : https://hal.archives-ouvertes.fr/inria-00071609

V. Fuller and T. Li, Classless Inter-Domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan, 2006.
DOI : 10.17487/rfc4632

J. Giesl, P. Schneider-kamp, and R. Thiemann, AProVE 1.2: Automatic Termination Proofs in the Dependency Pair Framework, Intl Joint Conf. on Automated Reasoning, pp.281-286, 2006.
DOI : 10.1007/11814771_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.2217

M. Gouda and A. Liu, Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004.
DOI : 10.1109/ICDCS.2004.1281597

H. Hamed and E. , Taxonomy of conflicts in network security policies, IEEE Communications Magazine, vol.44, issue.3, pp.134-141, 2006.
DOI : 10.1109/MCOM.2006.1607877

S. Hazelhurst, Algorithms for analysing firewall and router access lists, 2000.

F. Jacquemard, Decidable approximations of term rewriting systems, Rewriting Techniques and Applications, pp.362-376, 1996.
DOI : 10.1007/3-540-61464-8_65

J. Jouannaud and C. Kirchner, Solving equations in abstract algebras: a rule-based survey of unification, Computational Logic: Essays in Honor of Alan Robinson, pp.257-321, 1991.

C. Kirchner, H. Kirchner, and A. De-oliveira, Analysis of rewrite-based access control policies. Electronic Notes in Th, Comp. Sci, vol.234, pp.55-75, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00433409

M. Korp, C. Sternagel, H. Zankl, and A. Middeldorp, Tyrolean Termination Tool 2, Rewriting Techniques and Applications, pp.295-304, 2009.
DOI : 10.1007/978-3-540-70590-1_23

A. Liu, Formal Verification of Firewall Policies, 2008 IEEE International Conference on Communications, pp.1494-1498, 2008.
DOI : 10.1109/ICC.2008.289

A. X. Liu and M. G. Gouda, Firewall Policy Queries, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.6, pp.766-777, 2009.
DOI : 10.1109/TPDS.2008.263

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.2383

T. Nelson, C. Barratt, D. Dougherty, K. Fisler, and S. Krishnamurthi, The margrave tool for firewall analysis, Proceedings of the 24th international conference on Large installation system administration, pp.1-8, 2010.

R. Russell, Linux 2.4 packet filtering howto Available on, 2002.