Using Argumentation Logic for Firewall Policy Specification and Analysis
暂无分享,去创建一个
Alessandra Russo | Emil C. Lupu | Arosha K. Bandara | Antonis C. Kakas | A. Kakas | A. Russo | A. Bandara
[1] Bernhard Nebel,et al. On the computational complexity of assumption-based argumentation for default reasoning , 2002, Artif. Intell..
[2] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Phan Minh Dung,et al. An Abstract, Argumentation-Theoretic Approach to Default Reasoning , 1997, Artif. Intell..
[4] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[5] Phan Minh Dung,et al. On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning, Logic Programming and n-Person Games , 1995, Artif. Intell..
[6] Avishai Wool,et al. Offline firewall analysis , 2006, International Journal of Information Security.
[7] Henry Prakken,et al. A System for Defeasible Argumentation, with Defeasible Priorities , 1996, Artificial Intelligence Today.
[8] Tomás E. Uribe,et al. Automatic analysis of firewall and network intrusion detection system configurations , 2004, FMSE '04.
[9] Ehab Al-Shaer,et al. Firewall Policy Advisor for Anomaly Discovery and Rule Editing , 2003, Integrated Network Management.
[10] Paolo Mancarella,et al. The Acceptability Semantics for Logic Programs , 1994, ICLP.