An inference system for detecting firewall filtering rules anomalies, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, 2008. ,
DOI : 10.1145/1363686.1364197
URL : https://hal.archives-ouvertes.fr/inria-00329730
Firewall policy advisor for anomaly detection and rule editing, IEEE/IFIP Integrated Management, 2003. ,
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules, 2007 IEEE Symposium on Computers and Communications, 2007. ,
DOI : 10.1109/ISCC.2007.4381486
A Formal Approach to Specify and Deploy a Network Security Policy, Second Workshop on Formal Aspects in Security and Trust, pp.203-218, 2004. ,
DOI : 10.1007/0-387-24098-5_15
The yices smt solver, 2006. ,
An expert system for analyzing firewall rules, Proc. of 6th Nordic Workshop on Secure IT Systems, 2001. ,
Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004. ,
DOI : 10.1109/ICDCS.2004.1281597
A Domain Specific Language for Securing Distributed Systems, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007. ,
DOI : 10.1109/ICSNC.2007.2
URL : https://hal.archives-ouvertes.fr/hal-00306235
Algorithms for analyzing firewall and router access lists, 1999. ,
Firewall queries, Proc. of the 8th Int. Conf. on Principles of Distributed Systems, pp.197-212, 2004. ,
Fang: a firewall analysis engine, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.14-17, 2000. ,
DOI : 10.1109/SECPRI.2000.848455
Firewall policy analyzing by relational algebra, The 2004 Int. Technical Conf. on Circuits/Systems, Computers and Communications, 2004. ,