-
1
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
October
-
Ehab Al-Shaer, Hazem Hamed, Raouf Boutaba, and Masum Hasan. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications, 23 (10):2069-2084, October 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.10
, pp. 2069-2084
-
-
Al-Shaer, E.1
Hamed, H.2
Boutaba, R.3
Hasan, M.4
-
3
-
-
8344229907
-
Discoveryof policy anomalies in distributed firewalls
-
Ehab S. Al-Shaer and Hazem H. Hamed. Discoveryof policy anomalies in distributed firewalls. In Proceedings of IEEE Infocom, volume 4, pages 2605-2626, 2004.
-
(2004)
Proceedings of IEEE Infocom
, vol.4
, pp. 2605-2626
-
-
Al-Shaer, E.S.1
Hamed, H.H.2
-
5
-
-
10944269775
-
Firmato: A novel firewall management toolkit
-
November
-
Yair Bartal, Alain Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems, 22 (4):381-420, November 2004.
-
(2004)
ACM Transactions on Computer Systems
, vol.22
, Issue.4
, pp. 381-420
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
8
-
-
33750247176
-
Detection and removal of firewall misconfiguration
-
F. Cuppens, N. Cuppens-Boulahia, and J. García-Alfaro. Detection and removal of firewall misconfiguration. In IASTED International Conference on Communication, Network, and Information Security, 2005.
-
(2005)
IASTED International Conference on Communication, Network, and Information Security
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
García-Alfaro, J.3
-
9
-
-
0025447939
-
Comparing integrated and external logics of functional programs
-
P. Dybjer. Comparing integrated and external logics of functional programs. Science of Computer Programming, 14:59-79, 1990.
-
(1990)
Science of Computer Programming
, vol.14
, pp. 59-79
-
-
Dybjer, P.1
-
12
-
-
85034662938
-
Linear logic and parallelism
-
of Lecture Notes in Computer Science, Springer-Verlag
-
J.-Y. Girard. Linear logic and parallelism. In Mathematical Models for the Semantics of Parallelism, volume 280 of Lecture Notes in Computer Science, pages 166-182. Springer-Verlag, 1986.
-
(1986)
Mathematical Models for the Semantics of Parallelism
, vol.280
, pp. 166-182
-
-
Girard, J.-Y.1
-
13
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
Joshua D. Guttman. Filtering postures: Local enforcement for global policies. In IEEE Symposium on Security and Privacy, pages 120-129, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 120-129
-
-
Guttman, J.D.1
-
15
-
-
33645337636
-
Taxonomy of conflicts in network security policies
-
March
-
Hazem Haded and Ehab Al-Shaer. Taxonomy of conflicts in network security policies. IEEE Communications Magazine, 44 (3):134-141, March 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.3
, pp. 134-141
-
-
Haded, H.1
Al-Shaer, E.2
-
16
-
-
0033885347
-
Detecting and resolving packet filter conflicts
-
Adiseshu Hari, Subhash Suri, and Guru Parulkar. Detecting and resolving packet filter conflicts. In Proceedings of IEEE Infocom, volume 3, pages 1203-1212, 2000.
-
(2000)
Proceedings of IEEE Infocom
, vol.3
, pp. 1203-1212
-
-
Hari, A.1
Suri, S.2
Parulkar, G.3
-
17
-
-
0002386430
-
The formulae-as-types notion of construction
-
J. P. Selding and J. R. Hindley, editors, Academic Press H. B. Curry
-
W. A. Howard. The formulae-as-types notion of construction. In J. P. Selding and J. R. Hindley, editors, To H. B. Curry: Essays on Combinatory Logic, Lambda Calculus and Formalism, pages 479-490. Academic Press, 1980.
-
(1980)
Essays on Combinatory Logic, Lambda Calculus and Formalism
, pp. 479-490
-
-
Howard, W.A.1
-
18
-
-
35248843145
-
A new extraction for Coq
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Pierre Letouzey. A new extraction for Coq. In Types for Proofs and Programs, Second International Workshop, volume 2646 of Lecture Notes in Computer Science, pages 200-219. Springer-Verlag, 2003.
-
(2003)
Types for Proofs and Programs, Second International Workshop
, vol.2646
, pp. 200-219
-
-
Letouzey, P.1
-
19
-
-
26444606876
-
Complete redundancy detection in firewalls
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Alex X. Liu and Mohamed G. Gouda. Complete redundancy detection in firewalls. In Data and Applications Security, volume 3654 of Lecture Notes in Computer Science, pages 196-209. Springer-Verlag, 2005.
-
(2005)
Data and Applications Security
, vol.3654
, pp. 196-209
-
-
Liu, A.X.1
Gouda, M.G.2
-
21
-
-
64849115892
-
Access control policies: Modeling and validation
-
K. Adi, D. Amyot, and L. Logrippo, editors, Gatineau, Canada
-
Mahdi Mankai and Luigi Logrippo. Access control policies: Modeling and validation. In K. Adi, D. Amyot, and L. Logrippo, editors, 5th NOTERE Conference (Nouvelles Technologies de la Répartition), pages 85-91, Gatineau, Canada, 2005.
-
(2005)
5th NOTERE Conference (Nouvelles Technologies de la Répartition)
, pp. 85-91
-
-
Mankai, M.1
Logrippo, L.2
-
22
-
-
0003882263
-
-
Bibliopolis, Notes by Giovanni Sambin of a series of lectures given in Padua, June
-
Per Martin-Löf. Intuitionistic Type Theory. Bibliopolis, 1984. Notes by Giovanni Sambin of a series of lectures given in Padua, June 1980.
-
(1984)
Intuitionistic Type Theory
-
-
Martin-Löf, P.1
-
29
-
-
0003712416
-
-
Coq Development Team. LogiCal Project, INRIA, Available at the web page
-
The Coq Development Team. LogiCal Project. The Coq Proof Assistant. Reference Manual. Version 8. INRIA, 2004. Available at the web page http://pauillac.inria.fr/coq/coq-eng.html.
-
(2004)
The Coq Proof Assistant. Reference Manual. Version 8
-
-
-
30
-
-
20444432820
-
Automatic analysis of firewall and network intrusion detection system configurations
-
Tomás E. Uribe and Steven Cheung. Automatic analysis of firewall and network intrusion detection system configurations. In ACM Workshop on Formal Methods in Security Engineering, pages 66-74, 2004.
-
(2004)
ACM Workshop on Formal Methods in Security Engineering
, pp. 66-74
-
-
Uribe, A.T.1
Cheung, S.2
-
31
-
-
85084162640
-
Architecting the Lumeta firewall analyzer
-
Avishai Wool. Architecting the Lumeta firewall analyzer. In 10th USENIX Security Symposium, 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Wool, A.1
-
32
-
-
33751028760
-
FIREMAN: A toolkit for firewall modeling and analysis
-
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, and Prasant Mohapatra. FIREMAN: A toolkit for firewall modeling and analysis. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.-N.5
Mohapatra, P.6
|