An inference system for detecting firewall filtering rules anomalies, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2122-2128, 2008. ,
DOI : 10.1145/1363686.1364197
URL : https://hal.archives-ouvertes.fr/inria-00329730
Conflict classification and analysis of distributed firewall policies, IEEE Journal on Selected Areas in Communications, vol.23, issue.10, pp.2069-2084, 2005. ,
DOI : 10.1109/JSAC.2005.854119
Proving Confluence of Term Rewriting Systems Automatically, Rewriting Techniques and Applications, pp.93-102, 2009. ,
DOI : 10.1006/jsco.1994.1003
Term rewriting and all that, 1998. ,
Tom: Piggybacking Rewriting on Java, Rewriting Techniques and Applications, pp.36-47, 2007. ,
DOI : 10.1007/978-3-540-73449-9_5
URL : https://hal.archives-ouvertes.fr/inria-00142045
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules, 2007 IEEE Symposium on Computers and Communications, pp.63-70, 2007. ,
DOI : 10.1109/ISCC.2007.4381486
An overview of elan. Electronic Notes in Th, Comp. Sci, vol.15, pp.329-344, 1998. ,
URL : https://hal.archives-ouvertes.fr/inria-00098518
Ip filter based firewalls howto Available on: http://www.obfuscation.org/ipf/ipf-howto.pdf A3PAT, an approach for certified automated termination proofs, ACM SIGPLAN Work. on Partial evaluation and program manipulation, pp.63-72, 2002. ,
Detection and removal of firewall misconfiguration, Intl Conf. on Communication, Network and Information Security, 2005. ,
Detection of network security component misconfiguration by rewriting and correlation, Joint Conf. on Security in network ARchitectures and Security of Information Systems, 2006. ,
A Church-Rosser Checker Tool for Conditional Order-Sorted Equational Maude Specifications, pp.69-85, 2010. ,
DOI : 10.1007/978-3-642-16310-4_6
Autowrite: A tool for term rewrite systems and tree automata Electronic Notes in Th, Comp. Sci, vol.124, issue.2, pp.29-49, 2005. ,
An expert system for analyzing firewall rules, Nordic Work. on Secure IT Systems, pp.100-107, 2001. ,
Reachability Analysis over Term Rewriting Systems, Journal of Automated Reasoning, vol.37, issue.1?2, pp.341-383, 2004. ,
DOI : 10.1007/s10817-004-6246-0
URL : https://hal.archives-ouvertes.fr/inria-00071609
Classless Inter-Domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan, 2006. ,
DOI : 10.17487/rfc4632
AProVE 1.2: Automatic Termination Proofs in the Dependency Pair Framework, Intl Joint Conf. on Automated Reasoning, pp.281-286, 2006. ,
DOI : 10.1007/11814771_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.2217
Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004. ,
DOI : 10.1109/ICDCS.2004.1281597
Taxonomy of conflicts in network security policies, IEEE Communications Magazine, vol.44, issue.3, pp.134-141, 2006. ,
DOI : 10.1109/MCOM.2006.1607877
Algorithms for analysing firewall and router access lists, 2000. ,
Decidable approximations of term rewriting systems, Rewriting Techniques and Applications, pp.362-376, 1996. ,
DOI : 10.1007/3-540-61464-8_65
Solving equations in abstract algebras: a rule-based survey of unification, Computational Logic: Essays in Honor of Alan Robinson, pp.257-321, 1991. ,
Analysis of rewrite-based access control policies. Electronic Notes in Th, Comp. Sci, vol.234, pp.55-75, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00433409
Tyrolean Termination Tool 2, Rewriting Techniques and Applications, pp.295-304, 2009. ,
DOI : 10.1007/978-3-540-70590-1_23
Formal Verification of Firewall Policies, 2008 IEEE International Conference on Communications, pp.1494-1498, 2008. ,
DOI : 10.1109/ICC.2008.289
Firewall Policy Queries, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.6, pp.766-777, 2009. ,
DOI : 10.1109/TPDS.2008.263
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.2383
The margrave tool for firewall analysis, Proceedings of the 24th international conference on Large installation system administration, pp.1-8, 2010. ,
Linux 2.4 packet filtering howto Available on, 2002. ,