메뉴 건너뛰기




Volumn , Issue , 2007, Pages 22-30

Formal correctness of conflict detection for firewalls

Author keywords

Coq; Firewall

Indexed keywords

ACCESS RULES; CONFLICT DETECTION; CONFLICT DETECTION ALGORITHMS; COQ PROOF ASSISTANT; CORRECTNESS PROOFS; FORMAL CORRECTNESS; FORMAL DEFINITION; ONE-RULE; PROGRAM EXTRACTION; SET OF RULES;

EID: 77952368110     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314436.1314440     Document Type: Conference Paper
Times cited : (43)

References (33)
  • 3
    • 8344229907 scopus 로고    scopus 로고
    • Discoveryof policy anomalies in distributed firewalls
    • Ehab S. Al-Shaer and Hazem H. Hamed. Discoveryof policy anomalies in distributed firewalls. In Proceedings of IEEE Infocom, volume 4, pages 2605-2626, 2004.
    • (2004) Proceedings of IEEE Infocom , vol.4 , pp. 2605-2626
    • Al-Shaer, E.S.1    Hamed, H.H.2
  • 9
    • 0025447939 scopus 로고
    • Comparing integrated and external logics of functional programs
    • P. Dybjer. Comparing integrated and external logics of functional programs. Science of Computer Programming, 14:59-79, 1990.
    • (1990) Science of Computer Programming , vol.14 , pp. 59-79
    • Dybjer, P.1
  • 12
    • 85034662938 scopus 로고
    • Linear logic and parallelism
    • of Lecture Notes in Computer Science, Springer-Verlag
    • J.-Y. Girard. Linear logic and parallelism. In Mathematical Models for the Semantics of Parallelism, volume 280 of Lecture Notes in Computer Science, pages 166-182. Springer-Verlag, 1986.
    • (1986) Mathematical Models for the Semantics of Parallelism , vol.280 , pp. 166-182
    • Girard, J.-Y.1
  • 13
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • Joshua D. Guttman. Filtering postures: Local enforcement for global policies. In IEEE Symposium on Security and Privacy, pages 120-129, 1997.
    • (1997) IEEE Symposium on Security and Privacy , pp. 120-129
    • Guttman, J.D.1
  • 15
    • 33645337636 scopus 로고    scopus 로고
    • Taxonomy of conflicts in network security policies
    • March
    • Hazem Haded and Ehab Al-Shaer. Taxonomy of conflicts in network security policies. IEEE Communications Magazine, 44 (3):134-141, March 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.3 , pp. 134-141
    • Haded, H.1    Al-Shaer, E.2
  • 16
    • 0033885347 scopus 로고    scopus 로고
    • Detecting and resolving packet filter conflicts
    • Adiseshu Hari, Subhash Suri, and Guru Parulkar. Detecting and resolving packet filter conflicts. In Proceedings of IEEE Infocom, volume 3, pages 1203-1212, 2000.
    • (2000) Proceedings of IEEE Infocom , vol.3 , pp. 1203-1212
    • Hari, A.1    Suri, S.2    Parulkar, G.3
  • 17
    • 0002386430 scopus 로고
    • The formulae-as-types notion of construction
    • J. P. Selding and J. R. Hindley, editors, Academic Press H. B. Curry
    • W. A. Howard. The formulae-as-types notion of construction. In J. P. Selding and J. R. Hindley, editors, To H. B. Curry: Essays on Combinatory Logic, Lambda Calculus and Formalism, pages 479-490. Academic Press, 1980.
    • (1980) Essays on Combinatory Logic, Lambda Calculus and Formalism , pp. 479-490
    • Howard, W.A.1
  • 18
    • 35248843145 scopus 로고    scopus 로고
    • A new extraction for Coq
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Pierre Letouzey. A new extraction for Coq. In Types for Proofs and Programs, Second International Workshop, volume 2646 of Lecture Notes in Computer Science, pages 200-219. Springer-Verlag, 2003.
    • (2003) Types for Proofs and Programs, Second International Workshop , vol.2646 , pp. 200-219
    • Letouzey, P.1
  • 19
    • 26444606876 scopus 로고    scopus 로고
    • Complete redundancy detection in firewalls
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Alex X. Liu and Mohamed G. Gouda. Complete redundancy detection in firewalls. In Data and Applications Security, volume 3654 of Lecture Notes in Computer Science, pages 196-209. Springer-Verlag, 2005.
    • (2005) Data and Applications Security , vol.3654 , pp. 196-209
    • Liu, A.X.1    Gouda, M.G.2
  • 21
    • 64849115892 scopus 로고    scopus 로고
    • Access control policies: Modeling and validation
    • K. Adi, D. Amyot, and L. Logrippo, editors, Gatineau, Canada
    • Mahdi Mankai and Luigi Logrippo. Access control policies: Modeling and validation. In K. Adi, D. Amyot, and L. Logrippo, editors, 5th NOTERE Conference (Nouvelles Technologies de la Répartition), pages 85-91, Gatineau, Canada, 2005.
    • (2005) 5th NOTERE Conference (Nouvelles Technologies de la Répartition) , pp. 85-91
    • Mankai, M.1    Logrippo, L.2
  • 22
    • 0003882263 scopus 로고
    • Bibliopolis, Notes by Giovanni Sambin of a series of lectures given in Padua, June
    • Per Martin-Löf. Intuitionistic Type Theory. Bibliopolis, 1984. Notes by Giovanni Sambin of a series of lectures given in Padua, June 1980.
    • (1984) Intuitionistic Type Theory
    • Martin-Löf, P.1
  • 29
    • 0003712416 scopus 로고    scopus 로고
    • Coq Development Team. LogiCal Project, INRIA, Available at the web page
    • The Coq Development Team. LogiCal Project. The Coq Proof Assistant. Reference Manual. Version 8. INRIA, 2004. Available at the web page http://pauillac.inria.fr/coq/coq-eng.html.
    • (2004) The Coq Proof Assistant. Reference Manual. Version 8
  • 30
    • 20444432820 scopus 로고    scopus 로고
    • Automatic analysis of firewall and network intrusion detection system configurations
    • Tomás E. Uribe and Steven Cheung. Automatic analysis of firewall and network intrusion detection system configurations. In ACM Workshop on Formal Methods in Security Engineering, pages 66-74, 2004.
    • (2004) ACM Workshop on Formal Methods in Security Engineering , pp. 66-74
    • Uribe, A.T.1    Cheung, S.2
  • 31
    • 85084162640 scopus 로고    scopus 로고
    • Architecting the Lumeta firewall analyzer
    • Avishai Wool. Architecting the Lumeta firewall analyzer. In 10th USENIX Security Symposium, 2001.
    • (2001) 10th USENIX Security Symposium
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.