메뉴 건너뛰기




Volumn 9, Issue 3, 2012, Pages 318-331

Detecting and resolving firewall policy anomalies

Author keywords

access control; Firewall; policy anomaly management; visualization tool

Indexed keywords

ACCESS CONTROL; COMPUTER SYSTEM FIREWALLS; INFORMATION SERVICES; VISUALIZATION;

EID: 84858632756     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.20     Document Type: Article
Times cited : (125)

References (37)
  • 1
    • 8344229907 scopus 로고    scopus 로고
    • Discovery of policy anomalies in distributed firewalls
    • E. Al-Shaer and H. Hamed, "Discovery of Policy Anomalies in Distributed Firewalls," IEEE INFOCOM '04, vol. 4, pp. 2605-2616, 2004.
    • (2004) IEEE INFOCOM '04 , vol.4 , pp. 2605-2616
    • Al-Shaer, E.1    Hamed, H.2
  • 2
    • 77954346656 scopus 로고    scopus 로고
    • Trends in firewall configuration errors: Measuring the holes in swiss cheese
    • July/Aug.
    • A. Wool, "Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese," IEEE Internet Computing, vol. 14, no. 4, pp. 58-65, July/Aug. 2010.
    • (2010) IEEE Internet Computing , vol.14 , Issue.4 , pp. 58-65
    • Wool, A.1
  • 3
    • 41849107232 scopus 로고    scopus 로고
    • Complete analysis of configuration rules to guarantee reliable network security policies
    • DOI 10.1007/s10207-007-0045-7
    • J. Alfaro, N. Boulahia-Cuppens, and F. Cuppens, "Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies," Int'l J. Information Security, vol. 7, no. 2, pp. 103-122, 2008. (Pubitemid 351493917)
    • (2008) International Journal of Information Security , vol.7 , Issue.2 , pp. 103-122
    • Alfaro, J.G.1    Boulahia-Cuppens, N.2    Cuppens, F.3
  • 4
    • 0038148546 scopus 로고    scopus 로고
    • Fast and scalable conflict detection for packet classifiers
    • F. Baboescu and G. Varghese, "Fast and Scalable Conflict Detection for Packet Classifiers," Computer Networks, vol. 42, no. 6, pp. 717-735, 2003.
    • (2003) Computer Networks , vol.42 , Issue.6 , pp. 717-735
    • Baboescu, F.1    Varghese, G.2
  • 6
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in policy-based distributed systems management
    • DOI 10.1109/32.824414
    • E. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol. 25, no. 6, pp. 852-869, Nov./Dec. 1999. (Pubitemid 30583219)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 7
    • 0033872934 scopus 로고    scopus 로고
    • Graph visualization and navigation in information visualization: A survey
    • DOI 10.1109/2945.841119
    • I. Herman, G. Melançon, and M. Marshall, "Graph Visualization and Navigation in Information Visualization: A Survey," IEEE Trans. Visualization and Computer Graphics, vol. 6, no. 1, pp. 24-43, Jan.-Mar. 2000. (Pubitemid 30594718)
    • (2000) IEEE Transactions on Visualization and Computer Graphics , vol.6 , Issue.1 , pp. 24-43
    • Herman, I.1    Melancon, G.2    Marshall, M.S.3
  • 9
    • 78650101869 scopus 로고    scopus 로고
    • ProgME: Towards programmable network measurement
    • L. Yuan, C. Chuah, and P. Mohapatra, "ProgME: Towards Programmable Network Measurement," ACM SIGCOMM Computer Comm. Rev., vol. 37, no. 4, p. 108, 2007.
    • (2007) ACM SIGCOMM Computer Comm. Rev. , vol.37 , Issue.4 , pp. 108
    • Yuan, L.1    Chuah, C.2    Mohapatra, P.3
  • 13
    • 20844461569 scopus 로고    scopus 로고
    • Security meter: A practical decision-tree model to quantify risk
    • DOI 10.1109/MSP.2005.81
    • M. Sahinoglu, "Security Meter: A Practical Decision-Tree Model to Quantify Risk," IEEE Security and Privacy, vol. 3, no. 3, pp. 18-24, May 2005. (Pubitemid 40860469)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 18-24
    • Sahinoglu, M.1
  • 21
    • 79951680016 scopus 로고    scopus 로고
    • Patient-centric authorization framework for electronic healthcare services
    • J. Jin, G. Ahn, H. Hu, M. Covington, and X. Zhang, "Patient-Centric Authorization Framework for Electronic Healthcare Services," Computers and Security, vol. 30, no. 2, pp. 116-127, 2011.
    • (2011) Computers and Security , vol.30 , Issue.2 , pp. 116-127
    • Jin, J.1    Ahn, G.2    Hu, H.3    Covington, M.4    Zhang, X.5
  • 22
    • 0018515704 scopus 로고
    • Algorithms for reporting and counting geometric intersections
    • J. Bentley and T. Ottmann, "Algorithms for Reporting and Counting Geometric Intersections," IEEE Trans. Computers, vol. 28, no. 9, 1979.
    • (1979) IEEE Trans. Computers , vol.28 , Issue.9
    • Bentley, J.1    Ottmann, T.2
  • 24
    • 84858629505 scopus 로고    scopus 로고
    • "Java BDD," http://javabdd.sourceforge.net, 2012.
    • (2012) Java BDD
  • 25
    • 84858674078 scopus 로고    scopus 로고
    • "Buddy Version 2.4," http://sourceforge.net/projects/buddy, 2012.
    • (2012) Buddy Version 2.4
  • 27
    • 84858677775 scopus 로고    scopus 로고
    • Tissynbe.py
    • Tissynbe.py,http://www.tssci-security.com/projects/tissynbe-py, 2012.
    • (2012)
  • 30
    • 85084162640 scopus 로고    scopus 로고
    • Architecting the lumeta firewall analyzer
    • A. Wool, "Architecting the Lumeta Firewall Analyzer," Proc. 10th Conf. USENIX Security Symp., vol. 10, p. 7, 2001.
    • (2001) Proc. 10th Conf. USENIX Security Symp. , vol.10 , pp. 7
    • Wool, A.1
  • 35
    • 84944041936 scopus 로고    scopus 로고
    • IPSec/VPN security policy: Correctness, conflict detection, and resolution
    • Policies for Distributed Systems and Networks
    • Z. Fu, S. Wu, H. Huang, K. Loh, F. Gong, I. Baldine, and C. Xu, "IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution," Proc. Int'l Workshop Policies for Distributed Systems and Networks (POLICY '01), pp. 39-56, 2001. (Pubitemid 33225339)
    • (2001) Lecture Notes in Computer science , Issue.1995 , pp. 39-56
    • Fu, Z.1    Wu, S.F.2    Huang, H.3    Loh, K.4    Gong, F.5    Baldine, I.6    Xu, C.7
  • 37
    • 34250717425 scopus 로고    scopus 로고
    • An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
    • DOI 10.1145/1143120.1143123, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
    • C. Brodie, C. Karat, and J. Karat, "An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench," Proc. Second Symp. Usable Privacy and Security, pp. 8-19, 2006. (Pubitemid 46966965)
    • (2006) ACM International Conference Proceeding Series , vol.149 , pp. 8-19
    • Brodie, C.A.1    Karat, C.-M.2    Karat, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.