Projection and Division: Linear-Space Verification of Firewalls
暂无分享,去创建一个
[1] Mohamed G. Gouda,et al. Diverse Firewall Design , 2008, IEEE Trans. Parallel Distributed Syst..
[2] Guru M. Parulkar,et al. Detecting and resolving packet filter conflicts , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[3] Sonia Fahmy,et al. Analysis of vulnerabilities in Internet firewalls , 2003, Comput. Secur..
[4] Ehab Al-Shaer,et al. Automated pseudo-live testing of firewall configuration enforcement , 2009, IEEE Journal on Selected Areas in Communications.
[5] Avishai Wool,et al. Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Avishai Wool,et al. A quantitative study of firewall configuration errors , 2004, Computer.
[7] Mohamed G. Gouda,et al. Firewall Policy Queries , 2009, IEEE Transactions on Parallel and Distributed Systems.
[8] Mohamed G. Gouda,et al. Verification of Distributed Firewalls , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[9] Mohamed G. Gouda,et al. Structured firewall design , 2007, Comput. Networks.
[10] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[11] Ehab Al-Shaer,et al. Conflict classification and analysis of distributed firewall policies , 2005, IEEE Journal on Selected Areas in Communications.
[12] Sonia Fahmy,et al. Refereed papers: A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals1 1This work was supported by sponsers of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. , 2001 .
[13] Sonia Fahmy,et al. A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals , 2001, Comput. Secur..
[14] David Eppstein,et al. Internet packet filter management and rectangle geometry , 2000, SODA '01.
[15] Hrishikesh B. Acharya,et al. Linear-time verification of firewalls , 2009, 2009 17th IEEE International Conference on Network Protocols.