-
2
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
October Nominated for Best JSAC Paper Award for year 2005
-
E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC), 23(10), October 2005. Nominated for Best JSAC Paper Award for year 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.23
, Issue.10
-
-
Al-Shaer, E.1
Hamed, H.2
Boutaba, R.3
Hasan, M.4
-
4
-
-
8344229907
-
Discovery of policy anomalies in distributed firewalls
-
E. S. Al-shaer and H. H. Hamed. Discovery of policy anomalies in distributed firewalls. In In IEEE INFOCOM '04, pages 2605-2616, 2004.
-
(2004)
In IEEE INFOCOM '04
, pp. 2605-2616
-
-
Al-shaer, E.S.1
Hamed, H.H.2
-
5
-
-
65249107656
-
Shadow configuration as a network management primitive
-
R. Alimi, Y. Wang, and Y. R. Yang. Shadow configuration as a network management primitive. SIGCOMM Comput. Commun. Rev., 38(4):111-122, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 111-122
-
-
Alimi, R.1
Wang, Y.2
Yang, Y.R.3
-
6
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
August
-
R. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, August 1986.
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.1
-
7
-
-
35048900689
-
20 states and beyond
-
June
-
20 states and beyond. Journal of Information and Computation, 98(2):1-33, June 1992.
-
(1992)
Journal of Information and Computation
, vol.98
, Issue.2
, pp. 1-33
-
-
Burch, J.1
Clarke, E.2
McMillan, K.3
Dill, D.4
Hwang, J.5
-
8
-
-
0041474573
-
Integrity for virtual private routed networks
-
R. Bush and T. G. Griffin. Integrity for virtual private routed networks. In IEEE INFOCOM 2003, volume 2, pages 1467-1476, 2003.
-
(2003)
IEEE INFOCOM 2003
, vol.2
, pp. 1467-1476
-
-
Bush, R.1
Griffin, T.G.2
-
9
-
-
0001449325
-
Temporal and modal logic
-
J. van Leeuwen, editor, chapter 16, MIT Press
-
E. A. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. MIT Press, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 995-1072
-
-
Emerson, E.A.1
-
10
-
-
84894553762
-
Detecting BGP configuration faults with static analysis
-
N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, 2005.
-
(2005)
NSDI
-
-
Feamster, N.1
Balakrishnan, H.2
-
12
-
-
33744947504
-
On the correctness of IBGP configuration
-
New York, NY, USA, ACM
-
T. G. Griffin and G. Wilfong. On the correctness of IBGP configuration. In SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, pages 17-29, New York, NY, USA, 2002. ACM.
-
(2002)
SIGCOMM '02: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 17-29
-
-
Griffin, T.G.1
Wilfong, G.2
-
13
-
-
70350656962
-
Nox: Towards an operating system for networks
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. Nox: towards an operating system for networks. SIGCOMM Comput. Commun. Rev., 38(3):105-110, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
16
-
-
14344266667
-
Understanding BGP misconfiguration
-
New York, NY, USA, ACM
-
R. Mahajan, D. Wetherall, and T. Anderson. Understanding BGP misconfiguration. In SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, pages 3-16, New York, NY, USA, 2002. ACM.
-
(2002)
SIGCOMM '02: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 3-16
-
-
Mahajan, R.1
Wetherall, D.2
Anderson, T.3
-
17
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38(2):69-74, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
18
-
-
78149258537
-
-
Technical Report OpenFlow Technical Report 2009-1, Deutsche Telekom Inc. R&D Lab, Stanford University, Nicira Networks, October
-
R. Sherwood, G. Gibb, K.-K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar. Flowvisor: A network virtualization layer. Technical Report OpenFlow Technical Report 2009-1, Deutsche Telekom Inc. R&D Lab, Stanford University, Nicira Networks, October 2009.
-
(2009)
Flowvisor: A Network Virtualization Layer
-
-
Sherwood, R.1
Gibb, G.2
Yap, K.-K.3
Appenzeller, G.4
Casado, M.5
McKeown, N.6
Parulkar, G.7
-
19
-
-
25844500375
-
On static reachability analysis of ip networks
-
G. Xie, J. Z. D. Maltz, H. Zhang, A. G. G. Hjalmtysson, and J. Rexford. On static reachability analysis of ip networks. In IEEE INFOCOM 2005, volume 3, pages 2170- 2183, 2005.
-
(2005)
IEEE INFOCOM 2005
, vol.3
, pp. 2170-2183
-
-
Xie, G.1
Maltz, J.Z.D.2
Zhang, H.3
Hjalmtysson, A.G.G.4
Rexford, J.5
-
20
-
-
33751028760
-
FIREMAN: A toolkit for firewall modeling and analysis
-
L. Yuan, J. Mai, Z. Su, H. Chen, C. Chuah, and P. Mohapatra. FIREMAN: A toolkit for firewall modeling and analysis. In IEEE Symposium on Security and Privacy (SSP'06), May 2006.
-
IEEE Symposium on Security and Privacy (SSP'06), May 2006
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.5
Mohapatra, P.6
|