-
1
-
-
85008057842
-
Modeling and management of firewall policies
-
Ehab S. Al-Shaer and H. H. Hamed, "modeling and management of firewall policies," IEEE Transactions on Network and Service Management, vol. 1, no. 1, pp. 2-10, 2004.
-
(2004)
IEEE Transactions on Network and Service Management
, vol.1
, Issue.1
, pp. 2-10
-
-
Al-Shaer, E.S.1
Hamed, H.H.2
-
3
-
-
33750247176
-
Detection and removal of firewall misconfiguration
-
Phoenix, AZ, USA novembre
-
F. Cuppens, N. Cuppens-Boulahia, and J. Garcia Alfaro, "detection and removal of firewall misconfiguration," in CNIS IASTED, Phoenix, AZ, USA novembre, 2005.
-
(2005)
CNIS IASTED
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Garcia Alfaro, J.3
-
4
-
-
33746800235
-
Detection and resolution of anomalies in firewall policy rules
-
Muhammad Abedin, S. Nessa, L. Khan, and B. M. Thuraisingham, "detection and resolution of anomalies in firewall policy rules," in DBSec, 2006, pp. 15-29.
-
(2006)
DBSec
, pp. 15-29
-
-
Abedin, M.1
Nessa, S.2
Khan, L.3
Thuraisingham, B.M.4
-
5
-
-
84864270422
-
Firewall anomaly detection with a model checker for visibility logic
-
B. Khorchani, S. Hall, and R. Villemaire, "firewall anomaly detection with a model checker for visibility logic." in NOMS. IEEE, 2012, pp. 466-469.
-
(2012)
NOMS. IEEE
, pp. 466-469
-
-
Khorchani, B.1
Hall, S.2
Villemaire, R.3
-
6
-
-
85006691938
-
Detecting policy anomalies in firewalls by relational algebra and raining 2d-box model
-
Naveen Mukkapati and Ch.V.Bhargavi, "detecting policy anomalies in firewalls by relational algebra and raining 2d-box model," IJCSNS International Journal of Computer Science and Network Security, vol. 13, no. 5, pp. 94-99, 2013.
-
(2013)
IJCSNS International Journal of Computer Science and Network Security
, vol.13
, Issue.5
, pp. 94-99
-
-
Mukkapati, N.1
Bhargavi, C.V.2
-
7
-
-
84858632756
-
Detecting and resolving firewall policy anomalies
-
Hongxin Hu, G.-J. Ahn, and K. Kulkarni, "detecting and resolving firewall policy anomalies," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 318-331, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 318-331
-
-
Hu, H.1
Ahn, G.-J.2
Kulkarni, K.3
-
8
-
-
78650166376
-
Fame: A firewall anomaly management environment
-
ACM [Online]. Available
-
H. Hu, G.-J. Ahn, and k. Kulkarni, "fame: a firewall anomaly management environment." in SafeConfig. ACM, 2010, pp. 17-26. [Online]. Available: http://dblp.unitrier. de/db/conf/safeconfig/safeconfig2010.html
-
(2010)
SafeConfig
, pp. 17-26
-
-
Hu, H.1
Ahn, G.-J.2
Kulkarni, K.3
-
9
-
-
84906729325
-
-
[Online]. Available
-
(2012) firewall builder. [Online]. Available: http://www.fwbuilder.org/
-
(2012)
Firewall Builder
-
-
-
10
-
-
84906765838
-
-
[Online]. Available
-
(2012) athena firepac. [Online]. Available: http://www.solarwinds.com/ athena-security-products.aspx
-
(2012)
Athena Firepac
-
-
-
11
-
-
0033691924
-
Fang: A firewall analysis engine
-
Alain Mayer, A. Wool, and E. Ziskind, "fang: A firewall analysis engine," in Proceedings of 2000 IEEE Symposium on Security and Privacy, 2000, pp. 177-187.
-
(2000)
Proceedings of 2000 IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
12
-
-
33751028760
-
Fireman: A toolkit for firewall modeling and analysis
-
ser. SP '06. Washington, DC, USA: IEEE Computer Society
-
L. Yuan, J. Mai, Z. Su, H. Chen, C.-N. Chuah, and P. Mohapatra, "fireman: A toolkit for firewall modeling and analysis," in Proceedings of the 2006 IEEE Symposium on Security and Privacy, ser. SP '06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 199-213.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 199-213
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.-N.5
Mohapatra, P.6
-
13
-
-
51249107081
-
Formal verification of firewall policies
-
Alex X. Liu, "formal verification of firewall policies," in ICC, 2008, pp. 1494-1498.
-
(2008)
ICC
, pp. 1494-1498
-
-
Liu, A.X.1
-
14
-
-
58149113030
-
Automatic verification of firewall configuration with respect to security policy requirements
-
Soutaro Matsumoto and A. Bouhoula, "automatic verification of firewall configuration with respect to security policy requirements," in CISIS, 2008, pp. 123-130.
-
(2008)
CISIS
, pp. 123-130
-
-
Matsumoto, S.1
Bouhoula, A.2
-
15
-
-
70449510634
-
Automatic verification of conformance of firewall configurations to security policies
-
Nihel Ben Youssef, A. Bouhoula, and F. Jacquemard, "automatic verification of conformance of firewall configurations to security policies," in ISCC, 2009, pp. 526-531.
-
(2009)
ISCC
, pp. 526-531
-
-
Ben Youssef, N.1
Bouhoula, A.2
Jacquemard, F.3
-
16
-
-
78650374653
-
Integrated security analysis framework for an enterprise network - A formal approach
-
Padmalochan Bera, S. K. Ghosh, and P. Dasgupta, "integrated security analysis framework for an enterprise network - a formal approach," IET Information Security, vol. 4, no. 4, pp. 283-300, 2010.
-
(2010)
IET Information Security
, vol.4
, Issue.4
, pp. 283-300
-
-
Bera, P.1
Ghosh, S.K.2
Dasgupta, P.3
-
17
-
-
85008018448
-
Policy based security analysis in enterprise networks: A formal approach
-
P. Bera, S. Ghosh, and P. Dasgupta, "policy based security analysis in enterprise networks: A formal approach," Network and Service Management, IEEE Transactions on, vol. 7, no. 4, pp. 231-243, 2010.
-
(2010)
Network and Service Management, IEEE Transactions on
, vol.7
, Issue.4
, pp. 231-243
-
-
Bera, P.1
Ghosh, S.2
Dasgupta, P.3
-
18
-
-
84906765829
-
-
[Online]. Available
-
(2012) limboole sat solver. [Online]. Available: http://fmv.jku.at/ limboole/index.html
-
(2012)
Limboole Sat Solver
-
-
|