-
1
-
-
77952407814
-
Organization based access control
-
In: Lake Come
-
Abou el Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120-131 Lake Come, (2003)
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 120-131
-
-
Abou el Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
2
-
-
0033885347
-
Detecting and resolving packet filter conflicts
-
In: Tel-Aviv
-
Adiseshu, H., Suri, S., Parulkar, G.: Detecting and resolving packet filter conflicts. In: 19th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1203-1212, Tel-Aviv, (2000)
-
(2000)
19th Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1203-1212
-
-
Adiseshu, H.1
Suri, S.2
Parulkar, G.3
-
3
-
-
34548173265
-
Aggregating and deploying network access control policies
-
In: 2nd International Conference on Availability, Reliability and Security (ARES2007), Vienna
-
Alfaro, J.G., Cuppens, F., Cuppens-Boulahia, N.: Aggregating and deploying network access control policies. In: 1st Symposium on Frontiers in Availability, Reliability and Security (FARES), 2nd International Conference on Availability, Reliability and Security (ARES2007), Vienna, pp 532-539 (2007)
-
(2007)
1st Symposium on Frontiers in Availability, Reliability and Security (FARES)
, pp. 532-539
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
4
-
-
36248989621
-
Management of exceptions on access control policies
-
In: South Africa, May 2007 IFIP, Springer, Kluwer
-
Alfaro, J.G., Cuppens, F., Cuppens-Boulahia, N.: Management of exceptions on access control policies. In: 22nd IFIP TC-11 International Information Security Conference (IFIPsec2007), South Africa, May 2007, pp. 97-108. IFIP, Springer, Kluwer (2007)
-
(2007)
22nd IFIP TC-11 International Information Security Conference (IFIPsec2007)
, pp. 97-108
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
5
-
-
8344229907
-
Discovery of policy anomalies in distributed firewalls
-
In: Hong Kong
-
Al-Shaer, E.S., Hamed, H.H.: Discovery of policy anomalies in distributed firewalls. In: IEEE INFOCOM'04, vol. 4, pp. 2605-2616, Hong Kong (2004)
-
(2004)
IEEE INFOCOM'04
, vol.4
, pp. 2605-2616
-
-
Al-Shaer, E.S.1
Hamed, H.H.2
-
6
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
Al-Shaer E.S., Hamed H.H. and Masum H. (2005). Conflict classification and analysis of distributed firewall policies. IEEE J. Select. Areas Commun. 23(10): 2069-2084
-
(2005)
IEEE J. Select. Areas Commun.
, vol.23
, Issue.10
, pp. 2069-2084
-
-
Al-Shaer, E.S.1
Hamed, H.H.2
Masum, H.3
-
7
-
-
33645337636
-
Taxonomy of conflicts in network security policies
-
Al-Shaer E.S. and Hamed H.H. (2006). Taxonomy of conflicts in network security policies. IEEE Commun. Magazine 44(3): 134-141
-
(2006)
IEEE Commun. Magazine
, vol.44
, Issue.3
, pp. 134-141
-
-
Al-Shaer, E.S.1
Hamed, H.H.2
-
8
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
In: Oakland
-
BarAal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: a novel firewall management toolkit. In: IEEE Symposium on Security and Privacy, pp. 17-31, Oakland (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
11
-
-
0003437009
-
-
2nd edn. Addison-Wesley
-
Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley, (2003)
-
(2003)
Firewalls and Internet Security: Repelling the Wily Hacker
-
-
Cheswick, W.R.1
Bellovin, S.M.2
Rubin, A.D.3
-
12
-
-
41849089272
-
-
Cisco Systems, Inc. [Online]. Available from
-
Cisco Systems, Inc.: Cisco Security Manager Product Information. [Online]. Available from: http://cisco.com/go/csmanager
-
Cisco Security Manager Product Information
-
-
-
13
-
-
33750247176
-
Detection and removal of firewall misconfiguration
-
Cuppens, F., Cuppens-Boulahia, N., Alfaro, J.G.: Detection and removal of firewall misconfiguration. In: Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security, vol. 1, pp. 154-162, (2005)
-
(2005)
Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security
, vol.1
, pp. 154-162
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Alfaro, J.G.3
-
15
-
-
84890861666
-
A formal approach to specify and deploy a network security policy
-
In: Toulouse
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miege, A.: A formal approach to specify and deploy a network security policy. In: Second Workshop on Formal Aspects in Security and Trust, pp. 203-218, Toulouse (2004)
-
(2004)
Second Workshop on Formal Aspects in Security and Trust
, pp. 203-218
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miege, A.4
-
16
-
-
0003484888
-
Algorithms for routing lookups and packet classification
-
PhD Thesis. Department of Computer Science, Stanford University
-
Gupta, P.: Algorithms for routing lookups and packet classification. PhD Thesis. Department of Computer Science, Stanford University (2000)
-
(2000)
-
-
Gupta, P.1
-
17
-
-
34548187500
-
Role based network security model: A forward step towards firewall management
-
In: Algiers
-
Hassan, A., Hudec, L.: Role bAsed network security model: a forward step towards firewall management. In: Workshop on Security of Information Technologies, Algiers (2003)
-
(2003)
Workshop on Security of Information Technologies
-
-
Hassan, A.1
Hudec, L.2
-
20
-
-
0013347631
-
-
MITRE Corp. [Online]. Available from
-
MITRE Corp.: Common Vulnerabilities and Exposures. [Online]. Available from: http://cve.mitre.org/
-
Common Vulnerabilities and Exposures
-
-
-
22
-
-
84871961892
-
-
Open Security Foundation. [Online]. Available from
-
Open Security Foundation.: Open Source Vulnerability Database. [Online]. Available from: http://osvdb.org/
-
Open Source Vulnerability Database
-
-
-
23
-
-
84941154886
-
-
Available from
-
Reed, D.: IP Filter. [Online]. Hvailable from: http://coombs.anu.edu.au/ ~avalon/ip-filter.html [Online].
-
IP Filter
-
-
Reed, D.1
-
27
-
-
33750255748
-
-
[Online]. Available from
-
Welte, H., Kadlecsik, J., Josefsson, M., McHardy, P., et al.: The netfilter project: Firewalling, nat and packet mangling for linux 2.4x and 2.6.x. [Online]. Available from: http://www.netfilter.org/
-
The Netfilter Project: Firewalling, Nat and Packet Mangling for Linux 2.4x and 2.6.x
-
-
Welte, H.1
Kadlecsik, J.2
Josefsson, M.3
McHardy, P.4
-
28
-
-
33751028760
-
FIREMAN: A toolkit for FIREwall Modeling and ANalysis
-
In: Oakland
-
Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C., Mohapatra, P.: FIREMAN: a toolkit for FIREwall Modeling and ANalysis. In: IEEE Symposium on Security and Privacy, pp. 199-213, Oakland (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 199-213
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.5
Mohapatra, P.6
|