Novel algorithm for detecting conflicts in firewall rules
暂无分享,去创建一个
[1] Florent Jacquemard,et al. Automatic verification of conformance of firewall configurations to security policies , 2009, 2009 IEEE Symposium on Computers and Communications.
[2] Jean-Raymond Abrial,et al. Faultless Systems: Yes We Can! , 2009, Computer.
[3] Miroslav Svéda,et al. A Formal Model for Network-Wide Security Analysis , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[4] Michaël Rusinowitch,et al. An inference system for detecting firewall filtering rules anomalies , 2008, SAC '08.
[5] Sofiène Tahar,et al. Modeling and verification of firewall configurations using domain restriction method , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[6] Jonathan P. Bowen,et al. Formal Methods: State of the Art and New Directions , 2009 .
[7] Igor V. Kotenko,et al. Verification of security policy filtering rules by Model Checking , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[8] Achim D. Brucker,et al. Model-Based Firewall Conformance Testing , 2008, TestCom/FATES.
[9] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[10] Jean-Raymond Abrial,et al. Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.
[11] Hrishikesh B. Acharya,et al. Projection and Division: Linear-Space Verification of Firewalls , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[12] Alan Jeffrey,et al. Model Checking Firewall Policy Configurations , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.
[13] Alex X. Liu. Formal Verification of Firewall Policies , 2008, 2008 IEEE International Conference on Communications.