Firewall Rulebase Management: Tools and Techniques

[1]  E. Lawler Sequencing Jobs to Minimize Total Weighted Completion Time Subject to Precedence Constraints , 1978 .

[2]  Ehab Al-Shaer,et al.  On autonomic optimization of firewall policy organization , 2006, J. High Speed Networks.

[3]  Chad Verbowski System Administration: Drowning in Management Complexity , 2006, LISA.

[4]  Pasi Eronen,et al.  An expert system for analyzing firewall rules , 2001 .

[5]  Eugene H. Spafford,et al.  A reference model for firewall technology , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[6]  Ehab Al-Shaer,et al.  Modeling and Management of Firewall Policies , 2004, IEEE Transactions on Network and Service Management.

[7]  Avishai Wool,et al.  Firmato: A novel firewall management toolkit , 2004, TOCS.

[8]  Cristina Melchiors,et al.  Identification of intrusion scenarios through classification, characterization and analysis of firewall events , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[9]  Avishai Wool,et al.  Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[10]  Avishai Wool,et al.  Offline firewall analysis , 2006, International Journal of Information Security.