-
1
-
-
33845702245
-
-
High level firewall language. Available from: .
-
-
-
-
2
-
-
33845717161
-
-
ipchains. Available from: .
-
-
-
-
3
-
-
8344229907
-
-
E. Al-Shaer, H. Hamed, Discovery of policy anomalies in distributed firewalls, in: IEEE INFOCOM'04, 2004, pp. 2605-2616.
-
-
-
-
4
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
Al-Shaer E., Hamed H., Boutaba R., and Hasan M. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC) 23 10 (2005) 2069-2084
-
(2005)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.23
, Issue.10
, pp. 2069-2084
-
-
Al-Shaer, E.1
Hamed, H.2
Boutaba, R.3
Hasan, M.4
-
5
-
-
84904915613
-
-
F. Baboescu, G. Varghese, Fast and scalable conflict detection for packet classifiers, in: Proceedings of the 10th IEEE International Conference on Network Protocols, 2002.
-
-
-
-
6
-
-
84940102288
-
-
Y. Bartal, A.J. Mayer, K. Nissim, A. Wool, Firmato: a novel firewall management toolkit, in: Proceeding of the IEEE Symposium on Security and Privacy, 1999. pp. 17-31.
-
-
-
-
7
-
-
33845698147
-
-
A. Begel, S. McCanne, S.L. Graham, BPF+: exploiting global data-flow optimization in a generalized packet filter architecture, in: Proceedings of ACM SIGCOMM '99, 1999.
-
-
-
-
8
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
Bryant R.E. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers 35 8 (1986) 677-691
-
(1986)
IEEE Transactions on Computers
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
9
-
-
33845689914
-
-
CERT, Test the firewall system. Available from: .
-
-
-
-
10
-
-
84945709727
-
Goto statement considered harmful
-
Dijkstra E.W. Goto statement considered harmful. Communications of the ACM 11 3 (1968) 147-148
-
(1968)
Communications of the ACM
, vol.11
, Issue.3
, pp. 147-148
-
-
Dijkstra, E.W.1
-
11
-
-
65549164282
-
-
D. Eppstein, S. Muthukrishnan, Internet packet filter management and rectangle geometry, in: Symposium on Discrete Algorithms, 2001, pp. 827-835.
-
-
-
-
12
-
-
0038226197
-
A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals
-
Frantzen M., Kerschbaum F., Schultz E., and Fahmy S. A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals. Computers and Security 20 3 (2001) 263-270
-
(2001)
Computers and Security
, vol.20
, Issue.3
, pp. 263-270
-
-
Frantzen, M.1
Kerschbaum, F.2
Schultz, E.3
Fahmy, S.4
-
13
-
-
27544494353
-
-
M.G. Gouda, A.X. Liu, A model of stateful firewalls and its properties, in: Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN-05), 2005, pp. 320-327.
-
-
-
-
14
-
-
0035278163
-
Algorithms for packet classification
-
Gupta P., and McKeown N. Algorithms for packet classification. IEEE Network 15 2 (2001) 24-32
-
(2001)
IEEE Network
, vol.15
, Issue.2
, pp. 24-32
-
-
Gupta, P.1
McKeown, N.2
-
15
-
-
0030644427
-
-
J.D. Guttman, Filtering postures: local enforcement for global policies, in: Proceedings of IEEE Symposium on Security and Privacy, 1997, pp. 120-129.
-
-
-
-
16
-
-
0033885347
-
-
A. Hari, S. Suri, G.M. Parulkar, Detecting and resolving packet filter conflicts, in: Proceedings of IEEE INFOCOM, 2000, pp. 1203-1212.
-
-
-
-
17
-
-
0034590714
-
-
S. Hazelhurst, A. Attar, R. Sinnappan, Algorithms for improving the dependability of firewall and filter rule lists, in: Proceedings of the Workshop on Dependability of IP Applications, Platforms and Networks, 2000.
-
-
-
-
18
-
-
0037903656
-
Analysis of vulnerabilities in internet firewalls
-
Kamara S., Fahmy S., Schultz E., Kerschbaum F., and Frantzen M. Analysis of vulnerabilities in internet firewalls. Computers and Security 22 3 (2003) 214-232
-
(2003)
Computers and Security
, vol.22
, Issue.3
, pp. 214-232
-
-
Kamara, S.1
Fahmy, S.2
Schultz, E.3
Kerschbaum, F.4
Frantzen, M.5
-
19
-
-
27544466497
-
Firewall queries
-
Higashino T. (Ed), Springer-Verlag
-
Liu A.X., Gouda M.G., Ma H.H., and Ngu A.H. Firewall queries. In: Higashino T. (Ed). Proceedings of the 8th International Conference on Principles of Distributed Systems, Lecture Notes in Computer Science, 3544 (2004), Springer-Verlag 124-139
-
(2004)
Proceedings of the 8th International Conference on Principles of Distributed Systems, Lecture Notes in Computer Science, 3544
, pp. 124-139
-
-
Liu, A.X.1
Gouda, M.G.2
Ma, H.H.3
Ngu, A.H.4
-
20
-
-
0033691924
-
-
A. Mayer, A. Wool, E. Ziskind, Fang: A firewall analysis engine, in: Proceedings of IEEE Symposium on Security and Privacy, 2000, pp. 177-187.
-
-
-
-
21
-
-
0012794098
-
Policy conflict analysis in distributed system management
-
Moffett J.D., and Sloman M.S. Policy conflict analysis in distributed system management. Journal of Organizational Computing 4 1 (1994) 1-22
-
(1994)
Journal of Organizational Computing
, vol.4
, Issue.1
, pp. 1-22
-
-
Moffett, J.D.1
Sloman, M.S.2
-
22
-
-
33845200276
-
-
G. Patz, M. Condell, R. Krishnan, L. Sanchez, Multidimensional security policy management for dynamic coalitions, in: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II), 2001.
-
-
-
-
23
-
-
33744584654
-
Induction of decision trees
-
Quinlan J. Induction of decision trees. Machine Learning 1 1 (1986) 81-106
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.1
-
25
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
Wool A. A quantitative study of firewall configuration errors. IEEE Computer 37 6 (2004) 62-67
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
|