메뉴 건너뛰기




Volumn , Issue , 2009, Pages 123-132

Network configuration in a box: Towards end-to-end verification of network reachability and security

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; COMPUTATION TREE LOGIC; CONFIGURATION RULES; CTL MODEL-CHECKING; ERROR-PRONE NETWORK; MANAGEMENT TASKS; MISCONFIGURATIONS; MULTICAST PACKET; NETWORK ACCESS CONTROL; NETWORK CONFIGURATION; NETWORK REACHABILITY; PACKET HEADER; REACHABILITY; SECURITY PROPERTIES; SECURITY REQUIREMENTS; STATE MACHINE; SYMBOLIC MODEL CHECKING; UNICAST;

EID: 71949086200     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2009.5339690     Document Type: Conference Paper
Times cited : (155)

References (20)
  • 1
    • 84881122979 scopus 로고    scopus 로고
    • Configchecker. http://www.arc.cdm.depaul.edu/projects/ConfigChecker.
    • Configchecker
  • 3
    • 8344229907 scopus 로고    scopus 로고
    • Discovery of policy anomalies in distributed firewalls
    • March
    • E. Al-Shaer and H. Hamed. Discovery of policy anomalies in distributed firewalls. In Proceedings of IEEE INFOCOM'04, March 2004.
    • (2004) Proceedings of IEEE INFOCOM'04
    • Al-Shaer, E.1    Hamed, H.2
  • 4
    • 27644451689 scopus 로고    scopus 로고
    • Conflict classification and analysis of distributed firewall policies
    • October, Nominated for Best JSAC Paper Award for year 2005
    • E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC), 23(10), October 2005. Nominated for Best JSAC Paper Award for year 2005.
    • (2005) IEEE Journal on Selected Areas in Communications (JSAC) , vol.23 , Issue.10
    • Al-Shaer, E.1    Hamed, H.2    Boutaba, R.3    Hasan, M.4
  • 6
    • 0022769976 scopus 로고
    • Graph-based algorithms for Boolean function manipulation
    • August
    • R. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, August 1986.
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.1
  • 8
    • 0041474573 scopus 로고    scopus 로고
    • Integrity for virtual private routed networks
    • R. Bush and T. Griffin. Integrity for virtual private routed networks. In IEEE INFOCOM 2003, volume 2, pages 1467-1476, 2003.
    • (2003) IEEE INFOCOM 2003 , vol.2 , pp. 1467-1476
    • Bush, R.1    Griffin, T.2
  • 9
    • 0001449325 scopus 로고
    • Temporal and modal logic
    • Jan van Leeuwen, editor, Computer Science, chapter 16, MIT Press
    • E. Allen Emerson. Temporal and modal logic. In Jan van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. MIT Press, 1990.
    • (1990) Handbook of Theoretical , vol.B , pp. 995-1072
    • Allen Emerson, E.1
  • 10
    • 84894553762 scopus 로고    scopus 로고
    • Detecting BGP configuration faults with static analysis
    • N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, 2005.
    • (2005) NSDI
    • Feamster, N.1    Balakrishnan, H.2
  • 17
    • 85094321414 scopus 로고    scopus 로고
    • Network configuration management via model finding
    • S. Narain. Network configuration management via model finding. In LISA, pages 155-168, 2005.
    • (2005) LISA , pp. 155-168
    • Narain, S.1
  • 19
    • 4544284527 scopus 로고    scopus 로고
    • Y. Yang, C. U. Martel, and S. F. Wu. On building the minimum number of tunnels: An ordered-split approach to manage ipsec/vpn tunnels. In In 9th IEEE/IFIP Network Operation and Management Symposium (NOMS2004), pages 277-290, May 2004.
    • Y. Yang, C. U. Martel, and S. F. Wu. On building the minimum number of tunnels: An ordered-split approach to manage ipsec/vpn tunnels. In In 9th IEEE/IFIP Network Operation and Management Symposium (NOMS2004), pages 277-290, May 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.