-
2
-
-
10944269775
-
Firmato: A novel firewall management toolkit
-
Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22 (4), 381-420 (2004)
-
(2004)
ACM Trans. Comput. Syst.
, vol.22
, Issue.4
, pp. 381-420
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
3
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Bellovin, S.M.: Security problems in the TCP/IP protocol suite. Comput. Commun. Rev. 19 (2), 32-48 (1989)
-
(1989)
Comput. Commun. Rev.
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
6
-
-
0003437009
-
-
2nd edn. Addison-Wesley, Reading, MA
-
Cheswick, W.R., Bellovin, S.M., Rubin, A.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley, Reading, MA (2003)
-
(2003)
Firewalls and Internet Security: Repelling the Wily Hacker
-
-
Cheswick, W.R.1
Bellovin, S.M.2
Rubin, A.3
-
7
-
-
0037785368
-
-
O'Reilly & Associates, Inc., California
-
Dalheimer, M.K.: Programming With Qt. O'Reilly & Associates, Inc., California (1999)
-
(1999)
Programming With Qt
-
-
Dalheimer, M.K.1
-
8
-
-
0003772933
-
-
2nd edn. Springer, Berlin Heidelberg New York
-
De Berg, M., van Kreveld, M., Overmars, M.: Computational Geometry: Algorithms and Applications, 2nd edn. Springer, Berlin Heidelberg New York (2000)
-
(2000)
Computational Geometry: Algorithms and Applications
-
-
De Berg, M.1
van Kreveld, M.2
Overmars, M.3
-
9
-
-
0038081170
-
An expert system for analyzing firewall rules
-
Copenhagen, Denmark (November) Technical Report IMM-TR-2001-14, Technical University of Denmark
-
Eronen, P., Zitting, J.: An expert system for analyzing firewall rules. In: Proceedings of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pp. 100-107. Copenhagen, Denmark (November 2001); Technical Report IMM-TR-2001-14, Technical University of Denmark
-
(2001)
Proceedings of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001)
, pp. 100-107
-
-
Eronen, P.1
Zitting, J.2
-
10
-
-
0343302299
-
Improving the security of your site by breaking into it
-
Farmer, D., Venema, W.: Improving the security of your site by breaking into it. (1993) http://www.fish.com/security/admin-guide-to-cracking.html
-
(1993)
-
-
Farmer, D.1
Venema, W.2
-
12
-
-
33745178161
-
Firewall product overview
-
Fulmer, C.: Firewall product overview. (2002) http://www.thegild.com/ firewall/
-
(2002)
-
-
Fulmer, C.1
-
14
-
-
0027553807
-
A technique for drawing directed graphs
-
Gansner, E.R., Koutsofios, E., North, S.C., Vo, K.-P.: A technique for drawing directed graphs. IEEE Trans. Softw. Eng. 19 (3), 214-230 (1993)
-
(1993)
IEEE Trans. Softw. Eng.
, vol.19
, Issue.3
, pp. 214-230
-
-
Gansner, E.R.1
Koutsofios, E.2
North, S.C.3
Vo, K.-P.4
-
15
-
-
33745127775
-
Firewalking: A traceroute-like analysis of ip packet responses to determine gateway access control lists
-
White paper, Cambridge Technology Partners
-
Goldsmith, D., Schiffman, M.: Firewalking: A traceroute-like analysis of ip packet responses to determine gateway access control lists. White paper, Cambridge Technology Partners (1998), http://www.packetfactory.net/firewalk/
-
(1998)
-
-
Goldsmith, D.1
Schiffman, M.2
-
17
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
Oakland, CA. IEEE, Piscataway, NJ
-
Guttman, J.D.: Filtering postures: Local enforcement for global policies. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA. IEEE, Piscataway, NJ (1997)
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Guttman, J.D.1
-
18
-
-
18444377006
-
Security goals: Packet trajectories and strand spaces
-
Lecture Notes in Computer Science Springer, Berlin Heidelberg New York
-
Guttman, J.D.: Security goals: Packet trajectories and strand spaces. In: Foundations of Security Analysis and Design (FOSAD). Lecture Notes in Computer Science, vol. 2171. Springer, Berlin Heidelberg New York (2001)
-
(2001)
Foundations of Security Analysis and Design (FOSAD)
, vol.2171
-
-
Guttman, J.D.1
-
19
-
-
0034590714
-
Algorithms for improving the dependability of firewall and filter rule lists
-
IEEE Computer Society Press, Los Alamitos, CA Published in Proceedings of International Conference on Dependable Systems and Networks
-
Hazelhurst, S., Attar, A., Sinnappan, R.: Algorithms for improving the dependability of firewall and filter rule lists. In: Workshop on Dependability of IP Applications, Platforms and Networks, pp. 576-585. IEEE Computer Society Press, Los Alamitos, CA, (2000). Published in Proceedings of International Conference on Dependable Systems and Networks
-
(2000)
Workshop on Dependability of IP Applications, Platforms and Networks
, pp. 576-585
-
-
Hazelhurst, S.1
Attar, A.2
Sinnappan, R.3
-
22
-
-
33745169733
-
-
ICSA Labs Certified firewall products
-
ICSA Labs Certified firewall products. (2003) http://www.icsalabs.com/ html/communities/firewalls/certification/rxvendors/index.shtml
-
(2003)
-
-
-
23
-
-
33745161555
-
-
Security Internet Systems Internet Scanner
-
Internet Security Systems Internet Scanner (2000) http://documents.iss.net/literature/InternetScanner/is_prs.pdf
-
(2000)
-
-
-
24
-
-
33745157228
-
-
Internet Security Systems BlackICE Defender
-
Internet Security Systems BlackICE Defender (2003) http://blackice.iss.net/
-
(2003)
-
-
-
25
-
-
33745159385
-
Lucent VPN firewall brick
-
Lucent VPN firewall brick (2002) http://www.lucent.com/security
-
(2002)
-
-
-
26
-
-
0033691924
-
Fang: A firewall analysis engine
-
Oakland, CA. IEEE, Piscataway, NJ
-
Mayer, A., Wool, A., Ziskind, E.: Fang: A firewall analysis engine. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 177-187. Oakland, CA. IEEE, Piscataway, NJ (2000)
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
28
-
-
34748864450
-
On the topic of firewall testing
-
Ranum, M.: On the topic of firewall testing (1995) http://www.ranum.com/ pubs/fwtest/
-
(1995)
-
-
Ranum, M.1
-
29
-
-
0003731539
-
-
Wiley Computer Publishing, New York
-
Rubin, A., Geer, D., Ranum, M.: Web Security Sourcebook. Wiley Computer Publishing, New York (1997)
-
(1997)
Web Security Sourcebook
-
-
Rubin, A.1
Geer, D.2
Ranum, M.3
-
32
-
-
4544339971
-
-
Addison-Wesley, Reading, MA
-
Welch-Abernathy, D.D.: Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide. Addison-Wesley, Reading, MA (2002)
-
(2002)
Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide
-
-
Welch-Abernathy, D.D.1
-
33
-
-
85084162640
-
Architecting the Lumeta firewall analyzer
-
Washington, DC USENIX
-
Wool, A.: Architecting the Lumeta firewall analyzer. In: Proceedings of 10th USENIX Security Symposium, pp. 85-97. Washington, DC (2001). USENIX
-
(2001)
Proceedings of 10th USENIX Security Symposium
, pp. 85-97
-
-
Wool, A.1
-
34
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
Wool, A.: A quantitative study of firewall configuration errors. IEEE Computer 37 (6), 62-67 (2004)
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
-
35
-
-
3042539179
-
The use and usability of direction-based filtering in firewalls
-
Wool, A.: The use and usability of direction-based filtering in firewalls. Comput. Security 23 (6), 459-468 (2004)
-
(2004)
Comput. Security
, vol.23
, Issue.6
, pp. 459-468
-
-
Wool, A.1
-
36
-
-
4544338328
-
Fwrules50
-
Available from
-
Xu, W., O'Neal, S., Schoonover, J., Moser, S., Lamar, F., Grasboeck, G.: (2000) fwrules50, Available from http://www.phoneboy.com/fw1/
-
(2000)
-
-
Xu, W.1
O'Neal, S.2
Schoonover, J.3
Moser, S.4
Lamar, F.5
Grasboeck, G.6
-
37
-
-
33745125978
-
-
ZoneAlarm 3.7.143. Zone Labs
-
ZoneAlarm (2003) 3.7.143. Zone Labs, http://www.zonelabs.om/
-
(2003)
-
-
-
38
-
-
0004210998
-
-
2nd edn. O'Reilly & Associates, Inc., California
-
Zwicky, E.D., Cooper, S., Chapman, D.B.: Building Internet Firewalls, 2nd edn. O'Reilly & Associates, Inc., California (2000)
-
(2000)
Building Internet Firewalls
-
-
Zwicky, E.D.1
Cooper, S.2
Chapman, D.B.3
|