-
1
-
-
77954346656
-
Trends in firewall configuration errors: Measuring the holes in swiss cheese
-
July
-
A. Wool, "Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese", IEEE Internet Computing, vol. 14, no. 4, pp. 58-65, July 2010.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.4
, pp. 58-65
-
-
Wool, A.1
-
7
-
-
8344229907
-
Discovery of policy anomalies in distributed firewalls
-
Hong Kong, Cina, March 7-11
-
E. Al-Shaer and H. Hamed, "Discovery of policy anomalies in distributed firewalls", in INFOCOM 2004, Hong Kong, Cina, March 7-11 2004, pp. 2605-2616.
-
(2004)
INFOCOM 2004
, pp. 2605-2616
-
-
Al-Shaer, E.1
Hamed, H.2
-
8
-
-
33745155731
-
Offline firewall analysis
-
July
-
A. Mayer, A. Wool, and E. Ziskind, "Offline firewall analysis", International Journal of Information Security, vol. 5, no. 3, pp. 125-144, July 2006.
-
(2006)
International Journal of Information Security
, vol.5
, Issue.3
, pp. 125-144
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
9
-
-
84962868212
-
Quarnet: A tool for quantifying static network reachability
-
February
-
A. Khakpour and A. X. Liu, "Quarnet: A tool for quantifying static network reachability", IEEE/ACM Trans. Netw., vol. 21, no. 2, pp. 551-565, February 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.21
, Issue.2
, pp. 551-565
-
-
Khakpour, A.1
Liu, A.X.2
-
10
-
-
84962850302
-
-
"http://www.secured-fp7.eu."
-
-
-
-
11
-
-
51749126096
-
Geometric interpretation of policy specification
-
Palisades, NY, June 2-4
-
C. Basile, A. Cappadonia, and A. Lioy, "Geometric Interpretation of Policy Specification", in POLICY 2008: IEEE Workshop on Policies for Distributed Systems and Networks, Palisades, NY, June 2-4 2008, pp. 78-81.
-
(2008)
POLICY 2008: IEEE Workshop on Policies for Distributed Systems and Networks
, pp. 78-81
-
-
Basile, C.1
Cappadonia, A.2
Lioy, A.3
-
12
-
-
84865344402
-
Network-level access control policy analysis and transformation
-
Aug.
-
-, "Network-Level Access Control Policy Analysis and Transformation", IEEE/ACM Transactions on Networking, vol. 20, no. 4, pp. 985-998, Aug. 2012.
-
(2012)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.4
, pp. 985-998
-
-
-
15
-
-
51349156766
-
Firewall compressor: An algorithm for minimizing firewall policies
-
Phoenix, AZ, April 13-18
-
A. X. Liu, E. Torng, and C. R. Meiners, "Firewall Compressor: An Algorithm for Minimizing Firewall Policies", in INFOCOM2008: The 27th Conference on Computer Communications, Phoenix, AZ, April 13-18 2008, pp. 176-180.
-
(2008)
INFOCOM2008: The 27th Conference on Computer Communications
, pp. 176-180
-
-
Liu, A.X.1
Torng, E.2
Meiners, C.R.3
-
16
-
-
33745129743
-
Survey and taxonomy of packet classification techniques
-
September
-
D. E. Taylor, "Survey and taxonomy of packet classification techniques", ACM Computing Surveys, vol. 37, no. 3, pp. 238-275, September 2005.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.3
, pp. 238-275
-
-
Taylor, D.E.1
-
17
-
-
25844441677
-
Scalable packet classification using distributed crossproducing of field labels
-
Miami, FL, March 13-17
-
D. Taylor and J. Turner, "Scalable packet classification using distributed crossproducing of field labels", in 24th Annual Joint Conference of the IEEE Computer and Communications Societies., Miami, FL, March 13-17 2005, pp. 269-280.
-
(2005)
24th Annual Joint Conference of the IEEE Computer and Communications Societies.
, pp. 269-280
-
-
Taylor, D.1
Turner, J.2
-
18
-
-
85008057842
-
Modeling and management of firewall policies
-
April
-
E. Al-Shaer and H. Hamed, "Modeling and Management of Firewall Policies", IEEE Transactions on Network and Service Management, vol. 1, no. 1, pp. 2-10, April 2004.
-
(2004)
IEEE Transactions on Network and Service Management
, vol.1
, Issue.1
, pp. 2-10
-
-
Al-Shaer, E.1
Hamed, H.2
-
19
-
-
84962787761
-
Analysis of application-layer filtering policies with application to http
-
December
-
C. Basile and A. Lioy, "Analysis of Application-Layer Filtering Policies With Application to HTTP", IEEE/ACM Transactions on Networking, vol. 99, no. PP, pp. 1-1, December 2014.
-
(2014)
IEEE/ACM Transactions on Networking
, vol.99
, Issue.PP
, pp. 1
-
-
Basile, C.1
Lioy, A.2
-
20
-
-
84865319544
-
Semantic model for ipsec policy interaction
-
March 10
-
J. Zao, "Semantic model for ipsec policy interaction", Internet Draft, March 10, 2000.
-
(2000)
Internet Draft
-
-
Zao, J.1
-
21
-
-
0036086451
-
Methods and limitations of security policy reconciliation
-
Berkeley, CA, May 12-15
-
P. M. Daniel and A. Prakash, "Methods and limitations of security policy reconciliation", in 2002 IEEE Symposium on Security and Privacy, Berkeley, CA, May 12-15 2002, pp. 73-87.
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 73-87
-
-
Daniel, P.M.1
Prakash, A.2
-
22
-
-
0036086451
-
Methods and limitations of security policy reconciliation
-
Oakland, CA, May 12-15
-
P. McDaniel and A. Prakash, "Methods and limitations of security policy reconciliation", in 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 12-15 2002, pp. 73-87.
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 73-87
-
-
McDaniel, P.1
Prakash, A.2
-
23
-
-
11244319622
-
Security policy reconciliation in distributed computing environments
-
Yorktown Heights, NY, June 7-9
-
S. Jhat, M. Livny, and P. McDaniel, "Security policy reconciliation in distributed computing environments", in POLICY 2004:5th IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, NY, June 7-9 2004, pp. 137-146.
-
(2004)
POLICY 2004:5th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 137-146
-
-
Jhat, S.1
Livny, M.2
McDaniel, P.3
-
24
-
-
84962903198
-
Reconciling multiple IPsec and firewall policies
-
Brno, Czech Republic, April 18-20
-
M. Roe, "Reconciling Multiple IPsec and Firewall Policies", in 15th International Workshop on Security Protocols, Brno, Czech Republic, April 18-20 2007, pp. 98-103.
-
(2007)
15th International Workshop on Security Protocols
, pp. 98-103
-
-
Roe, M.1
-
25
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. De Capitani di Vimercati, and P. Samarati, "An algebra for composing access control policies", ACM Transactions on Information and System Security, vol. 5, no. 1, pp. 1-35, February 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Di Vimercati, S.D.C.2
Samarati, P.3
-
26
-
-
70450229409
-
A simple and expressive semantic framework for policy composition in access control
-
Arlington, VA, November 2
-
G. Bruns, D. S. Dantas, and M. Huth, "A simple and expressive semantic framework for policy composition in access control", in FMSE07:2007 ACM workshop on Formal methods in security engineering, Arlington, VA, November 2 2007, pp. 12-21.
-
(2007)
FMSE07:2007 ACM Workshop on Formal Methods in Security Engineering
, pp. 12-21
-
-
Bruns, G.1
Dantas, D.S.2
Huth, M.3
-
27
-
-
70450277229
-
Access control policy combining
-
Stresa, Italy, June 2-5
-
N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin, "Access control policy combining", in SACMAT09:14th ACM symposium on Access control models and technologies, Stresa, Italy, June 2-5 2009, pp. 135-144.
-
(2009)
SACMAT09:14th ACM Symposium on Access Control Models and Technologies
, pp. 135-144
-
-
Li, N.1
Wang, Q.2
Qardaji, W.3
Bertino, E.4
Rao, P.5
Lobo, J.6
Lin, D.7
-
28
-
-
70450247027
-
An algebra for finegrained integration of XACML policies
-
Stresa, Italy, June 2-5
-
P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo, "An algebra for finegrained integration of XACML policies", in SACMAT09:14th ACM symposium on Access control models and technologies, Stresa, Italy, June 2-5 2009, pp. 63-72.
-
(2009)
SACMAT09:14th ACM Symposium on Access Control Models and Technologies
, pp. 63-72
-
-
Rao, P.1
Lin, D.2
Bertino, E.3
Li, N.4
Lobo, J.5
|