-
1
-
-
8344229907
-
Discovery of policy anomalies in distributed firewalls
-
E. Al-Shaer and H. Hamed, "Discovery of Policy Anomalies in Distributed Firewalls," IEEE INFOCOM '04, vol. 4, pp. 2605-2616, 2004.
-
(2004)
IEEE INFOCOM '04
, vol.4
, pp. 2605-2616
-
-
Al-Shaer, E.1
Hamed, H.2
-
2
-
-
77954346656
-
Trends in firewall configuration errors: Measuring the holes in swiss cheese
-
July/Aug.
-
A. Wool, "Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese," IEEE Internet Computing, vol. 14, no. 4, pp. 58-65, July/Aug. 2010.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.4
, pp. 58-65
-
-
Wool, A.1
-
3
-
-
41849107232
-
Complete analysis of configuration rules to guarantee reliable network security policies
-
DOI 10.1007/s10207-007-0045-7
-
J. Alfaro, N. Boulahia-Cuppens, and F. Cuppens, "Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies," Int'l J. Information Security, vol. 7, no. 2, pp. 103-122, 2008. (Pubitemid 351493917)
-
(2008)
International Journal of Information Security
, vol.7
, Issue.2
, pp. 103-122
-
-
Alfaro, J.G.1
Boulahia-Cuppens, N.2
Cuppens, F.3
-
4
-
-
0038148546
-
Fast and scalable conflict detection for packet classifiers
-
F. Baboescu and G. Varghese, "Fast and Scalable Conflict Detection for Packet Classifiers," Computer Networks, vol. 42, no. 6, pp. 717-735, 2003.
-
(2003)
Computer Networks
, vol.42
, Issue.6
, pp. 717-735
-
-
Baboescu, F.1
Varghese, G.2
-
5
-
-
33751028760
-
Fireman: A toolkit for firewall modeling and analysis
-
L. Yuan, H. Chen, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis, "Fireman: A Toolkit for Firewall Modeling and Analysis," Proc. IEEE Symp. Security and Privacy, p. 15, 2006.
-
(2006)
Proc. IEEE Symp. Security and Privacy
, pp. 15
-
-
Yuan, L.1
Chen, H.2
Mai, J.3
Chuah, C.4
Su, Z.5
Mohapatra, P.6
Davis, C.7
-
6
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
DOI 10.1109/32.824414
-
E. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol. 25, no. 6, pp. 852-869, Nov./Dec. 1999. (Pubitemid 30583219)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
7
-
-
0033872934
-
Graph visualization and navigation in information visualization: A survey
-
DOI 10.1109/2945.841119
-
I. Herman, G. Melançon, and M. Marshall, "Graph Visualization and Navigation in Information Visualization: A Survey," IEEE Trans. Visualization and Computer Graphics, vol. 6, no. 1, pp. 24-43, Jan.-Mar. 2000. (Pubitemid 30594718)
-
(2000)
IEEE Transactions on Visualization and Computer Graphics
, vol.6
, Issue.1
, pp. 24-43
-
-
Herman, I.1
Melancon, G.2
Marshall, M.S.3
-
8
-
-
79960152755
-
Anomaly discovery and resolution in web access control policies
-
H. Hu, G. Ahn, and K. Kulkarni, "Anomaly Discovery and Resolution in Web Access Control Policies," Proc. 16th ACM Symp. Access Control Models and Technologies, pp. 165-174, 2011.
-
(2011)
Proc. 16th ACM Symp. Access Control Models and Technologies
, pp. 165-174
-
-
Hu, H.1
Ahn, G.2
Kulkarni, K.3
-
9
-
-
78650101869
-
ProgME: Towards programmable network measurement
-
L. Yuan, C. Chuah, and P. Mohapatra, "ProgME: Towards Programmable Network Measurement," ACM SIGCOMM Computer Comm. Rev., vol. 37, no. 4, p. 108, 2007.
-
(2007)
ACM SIGCOMM Computer Comm. Rev.
, vol.37
, Issue.4
, pp. 108
-
-
Yuan, L.1
Chuah, C.2
Mohapatra, P.3
-
10
-
-
33749044427
-
Policy segmentation for intelligent firewall testing
-
A. El-Atawy, K. Ibrahim, H. Hamed, and E. Al-Shaer, "Policy Segmentation for Intelligent Firewall Testing," Proc. First Workshop Secure Network Protocols (NPSec '05), 2005.
-
(2005)
Proc. First Workshop Secure Network Protocols (NPSec '05)
-
-
El-Atawy, A.1
Ibrahim, K.2
Hamed, H.3
Al-Shaer, E.4
-
11
-
-
67449085828
-
A general framework for benchmarking firewall optimization techniques
-
Dec.
-
G. Misherghi, L. Yuan, Z. Su, C.-N. Chuah, and H. Chen, "A General Framework for Benchmarking Firewall Optimization Techniques," IEEE Trans. Network and Service Management, vol. 5, no. 4, pp. 227-238, Dec. 2008.
-
(2008)
IEEE Trans. Network and Service Management
, vol.5
, Issue.4
, pp. 227-238
-
-
Misherghi, G.1
Yuan, L.2
Su, Z.3
Chuah, C.-N.4
Chen, H.5
-
12
-
-
70349303945
-
Measuring network security using dynamic bayesian network
-
M. Frigault, L. Wang, A. Singhal, and S. Jajodia, "Measuring Network Security Using Dynamic Bayesian Network," Proc. Fourth ACM Workshop Quality of Protection, 2008.
-
(2008)
Proc. Fourth ACM Workshop Quality of Protection
-
-
Frigault, M.1
Wang, L.2
Singhal, A.3
Jajodia, S.4
-
13
-
-
20844461569
-
Security meter: A practical decision-tree model to quantify risk
-
DOI 10.1109/MSP.2005.81
-
M. Sahinoglu, "Security Meter: A Practical Decision-Tree Model to Quantify Risk," IEEE Security and Privacy, vol. 3, no. 3, pp. 18-24, May 2005. (Pubitemid 40860469)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 18-24
-
-
Sahinoglu, M.1
-
17
-
-
0030677524
-
A logical language for expressing authorizations
-
May
-
S. Jajodia, P. Samarati, and V.S. Subrahmanian, "A Logical Language for Expressing Authorizations," Proc. IEEE Symp. Security and Privacy, pp. 31-42, May 1997.
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
19
-
-
70450277229
-
Access control policy combining: Theory meets practice
-
N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin, "Access Control Policy Combining: Theory Meets Practice," Proc. 14th ACM Symp. Access Control Models and Technologies, pp. 135-144, 2009.
-
(2009)
Proc. 14th ACM Symp. Access Control Models and Technologies
, pp. 135-144
-
-
Li, N.1
Wang, Q.2
Qardaji, W.3
Bertino, E.4
Rao, P.5
Lobo, J.6
Lin, D.7
-
20
-
-
70450252045
-
Patient-centric authorization framework for sharing electronic health records
-
J. Jin, G. Ahn, H. Hu, M. Covington, and X. Zhang, "Patient-Centric Authorization Framework for Sharing Electronic Health Records," Proc. 14th ACM Symp. Access Control Models and Technologies, pp. 125-134, 2009.
-
(2009)
Proc. 14th ACM Symp. Access Control Models and Technologies
, pp. 125-134
-
-
Jin, J.1
Ahn, G.2
Hu, H.3
Covington, M.4
Zhang, X.5
-
21
-
-
79951680016
-
Patient-centric authorization framework for electronic healthcare services
-
J. Jin, G. Ahn, H. Hu, M. Covington, and X. Zhang, "Patient-Centric Authorization Framework for Electronic Healthcare Services," Computers and Security, vol. 30, no. 2, pp. 116-127, 2011.
-
(2011)
Computers and Security
, vol.30
, Issue.2
, pp. 116-127
-
-
Jin, J.1
Ahn, G.2
Hu, H.3
Covington, M.4
Zhang, X.5
-
22
-
-
0018515704
-
Algorithms for reporting and counting geometric intersections
-
J. Bentley and T. Ottmann, "Algorithms for Reporting and Counting Geometric Intersections," IEEE Trans. Computers, vol. 28, no. 9, 1979.
-
(1979)
IEEE Trans. Computers
, vol.28
, Issue.9
-
-
Bentley, J.1
Ottmann, T.2
-
23
-
-
71949086200
-
Network configuration in a box: Towards end-to-end verification of network reachability and security
-
E. Al-Shaer, W. Marrero, A. El-Atawy, and K. ElBadawi, "Network Configuration in a Box: Towards End-to-End Verification of Network Reachability and Security," Proc. Int'l Conf. Network Protocols (ICNP '09), pp. 123-132, 2009.
-
(2009)
Proc. Int'l Conf. Network Protocols (ICNP '09)
, pp. 123-132
-
-
Al-Shaer, E.1
Marrero, W.2
El-Atawy, A.3
ElBadawi, K.4
-
24
-
-
84858629505
-
-
"Java BDD," http://javabdd.sourceforge.net, 2012.
-
(2012)
Java BDD
-
-
-
25
-
-
84858674078
-
-
"Buddy Version 2.4," http://sourceforge.net/projects/buddy, 2012.
-
(2012)
Buddy Version 2.4
-
-
-
27
-
-
84858677775
-
-
Tissynbe.py
-
Tissynbe.py,http://www.tssci-security.com/projects/tissynbe-py, 2012.
-
(2012)
-
-
-
29
-
-
34547239511
-
A scalable approach to attack graph generation
-
DOI 10.1145/1180405.1180446, 1180446, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
X. Ou, W. Boyer, and M. McQueen, "A Scalable Approach to Attack Graph Generation," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 336-345, 2006. (Pubitemid 47131381)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
30
-
-
85084162640
-
Architecting the lumeta firewall analyzer
-
A. Wool, "Architecting the Lumeta Firewall Analyzer," Proc. 10th Conf. USENIX Security Symp., vol. 10, p. 7, 2001.
-
(2001)
Proc. 10th Conf. USENIX Security Symp.
, vol.10
, pp. 7
-
-
Wool, A.1
-
31
-
-
0033691924
-
Fang: A firewall analysis engine
-
A. Mayer, A. Wool, and E. Ziskind, "Fang: A Firewall Analysis Engine," Proc. IEEE Symp. Security and Privacy, pp. 177-189, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
, pp. 177-189
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
32
-
-
2442419072
-
Firewall design: Consistency, completeness, and compactness
-
M. Gouda and X. Liu, "Firewall Design: Consistency, Completeness, and Compactness," Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS '04), p. 327, 2004.
-
(2004)
Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS '04)
, pp. 327
-
-
Gouda, M.1
Liu, X.2
-
33
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith, "Implementing a Distributed Firewall," Proc. Seventh ACM Conf. Computer and Comm. Security, p. 199, 2000.
-
(2000)
Proc. Seventh ACM Conf. Computer and Comm. Security
, pp. 199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
35
-
-
84944041936
-
IPSec/VPN security policy: Correctness, conflict detection, and resolution
-
Policies for Distributed Systems and Networks
-
Z. Fu, S. Wu, H. Huang, K. Loh, F. Gong, I. Baldine, and C. Xu, "IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution," Proc. Int'l Workshop Policies for Distributed Systems and Networks (POLICY '01), pp. 39-56, 2001. (Pubitemid 33225339)
-
(2001)
Lecture Notes in Computer science
, Issue.1995
, pp. 39-56
-
-
Fu, Z.1
Wu, S.F.2
Huang, H.3
Loh, K.4
Gong, F.5
Baldine, I.6
Xu, C.7
-
36
-
-
56449119921
-
Expandable grids for visualizing and authoring computer security policies
-
R. Reeder, L. Bauer, L. Cranor, M. Reiter, K. Bacon, K. How, and H. Strong, "Expandable Grids for Visualizing and Authoring Computer Security Policies," Proc. 26th Ann. SIGCHI Conf. Human Factors in Computing Systems, pp. 1473-1482, 2008.
-
(2008)
Proc. 26th Ann. SIGCHI Conf. Human Factors in Computing Systems
, pp. 1473-1482
-
-
Reeder, R.1
Bauer, L.2
Cranor, L.3
Reiter, M.4
Bacon, K.5
How, K.6
Strong, H.7
-
37
-
-
34250717425
-
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
-
DOI 10.1145/1143120.1143123, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
C. Brodie, C. Karat, and J. Karat, "An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench," Proc. Second Symp. Usable Privacy and Security, pp. 8-19, 2006. (Pubitemid 46966965)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 8-19
-
-
Brodie, C.A.1
Karat, C.-M.2
Karat, J.3
|