Taxonomy of conflicts in network security policies
暂无分享,去创建一个
[1] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[2] Emil C. Lupu,et al. Conflict Analysis for Management Policies , 1997, Integrated Network Management.
[3] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[4] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[5] Avishai Wool,et al. Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Scott Hazelhurst. Algorithms for Analysing Firewall and Router Access Lists , 2000, ArXiv.
[7] Guru M. Parulkar,et al. Detecting and resolving packet filter conflicts , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[8] Pasi Eronen,et al. An expert system for analyzing firewall rules , 2001 .
[9] He Huang,et al. IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution , 2001, POLICY.
[10] Eric Vyncke,et al. IPsec Configuration Policy Information Model , 2003, RFC.
[11] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[12] Ehab Al-Shaer,et al. Modeling and verification of IPSec and VPN security policies , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).