-
1
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
In, Oakland, California
-
Bartal, Y., Mayer, A., Nissim, K., and Wool, A. (1999). Firmato: A novel firewall management toolkit. In 20th IEEE Symposium on Security and Privacy, pages 17-31, Oakland, California.
-
(1999)
20th IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
2
-
-
84902496459
-
-
Checkpoint, In
-
Checkpoint (2004). Firewall-1. In http://www.checkpoint.com/.
-
(2004)
Firewall-1
-
-
-
3
-
-
33746441974
-
Inheritance hierarchies in the Or-BAC Model and application in a network environment
-
In, Turku, Finland
-
Cuppens, F., Cuppens-Boulahia, N., and Miège, A. (2004a). Inheritance hierarchies in the Or-BAC Model and application in a network environment. In Second Foundations of Computer Security Workshop (FCS'04), Turku, Finland.
-
(2004)
Second Foundations of Computer Security Workshop (FCS'04)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miège, A.3
-
4
-
-
33751017347
-
-
In, (full version of the paper presented at FAST 2004)
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T., and Migge, A. (2004b). A Formal Approach to Specify and Deploy a Network Security Policy. In http://www.rennes.enst-bretagne.fr/ fcup-pens/articles/fast2004.pdf (full version of the paper presented at FAST 2004).
-
(2004)
A Formal Approach to Specify and Deploy a Network Security Policy
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Migge, A.4
-
9
-
-
34548187500
-
Role Based Network Security Model: A Forward Step towards Firewall Management
-
In, Algiers
-
Hassan, A. and Hudec, L. (2003). Role Based Network Security Model: A Forward Step towards Firewall Management. In Workshop On Security of Information Technologies, Algiers.
-
(2003)
Workshop On Security of Information Technologies
-
-
Hassan, A.1
Hudec, L.2
-
10
-
-
77952407814
-
Organization Based Access Control
-
In, Lake Come, Italy
-
Kalam, A. A. E., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., and Trouessin, G. (2003). Organization Based Access Control. In Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Come, Italy.
-
(2003)
Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Kalam, A.A.E.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
12
-
-
0033691924
-
Fang: A Firewall Analysis Engine
-
In, Oakland, California
-
Mayer, A., Wool, A., and Ziskind, E. (2000). Fang: A Firewall Analysis Engine. In 21th IEEE Symposium on Security and Privacy, pages 177-187, Oakland, California.
-
(2000)
21th IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
14
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E. (1996). Role-Based Access Control Models. IEEE Computer, 29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
84902451125
-
-
In
-
Tsaousis, C. (2004). FireHOL, R5 VI. 159. In http://firehol.sourceforge.net/.
-
(2004)
FireHOL, R5 VI
, pp. 159
-
-
Tsaousis, C.1
-
16
-
-
25144503410
-
-
W3C, (Third Edition). In
-
W3C (2004). Extensible Markup Language (XML) 1.0 (Third Edition). In http://www.w3.org/TR/REC-xml/.
-
(2004)
Extensible Markup Language (XML) 1.0
-
-
|