256
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

VERIFICATION OF DISTRIBUTED FIREWALLS CONFIGURATION VS. SECURITY POLICIES USING ℒℐ()

&
Pages 945-975 | Published online: 13 Nov 2009

REFERENCES

  • Al-Shaer , E. and H. Hamed . 2003 . Firewall policy advisor for anomaly detection and rule editing . At the 8th IEEE/IFIP Integrated Network Management . Colorado Springs, CO .
  • Al-Shaer , E. and H. Hamed 2004 . Modeling and management of firewall policies . IEEE Transactions on Network and Service Management 1 .
  • Al-Shaer , E. and H. Hamed . 2006 . Taxonomy of conflicts in network security policies . IEEE Communications Magazine 44 ( 3 ): 134 – 141 .
  • Al-Shaer , E. , H. Hamed , R. Boutaba , and M. Hasan . 2005 . Conflict classification and analysis of distributed firewall policies . IEEE Journal on Selected Areas in Communications 23 ( 10 ): 2069 – 2084 .
  • Avishai , W. 2001 . Architecting the Lumeta firewall analyzer . At the 10th Conference on USENIX Security Symposium 10 . Washington , D.C. : USENIX Association .
  • Baader , F. , D. L. McGuinness , D. Nardi , and P. F. Patel-Schneider . 2003 . The Description Logic Handbook: Theory, Implementation, and Applications . Boston : Cambridge University Press .
  • Bandara , A. K. , T. Kakas , E. Lupu , and A. Russo . 2006. Using argumentation logic for firewall policy specification and analysis. Paper at 17th IFIP/IEEE Distributed Systems: Operations and Management. Dublin, Ireland.
  • Bandara , A. K. , E. C. Lupu , and A. Russo . 2003 . Using event calculus to formalise policy specification and analysis. Paper at the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy.
  • Bartal , Y. , A. Mayer , K. Nissim , and A. Wool . 1999 . Firmato: A novel firewall management toolkit . Paper at IEEE Symposium on Security and Privacy. Oakland , CA .
  • Burns , J. , A. Cheng , P. Gurung , S. Rajagopalan , P. Rao , D. Rosenbluth , A. V. Surendran , and D. M. Martin . 2001 . Automatic management of network security policy . Paper at DARPA Information Survivability Conference and Exposition II , Anaheim , CA .
  • Cuppens , F. , N. Cuppens-Boulahia , A. Miege , and T. Sans . 2004 . A formal approach to specify and deploy a network security policy . Paper at 2nd Workshop on Formal Aspects in Security and Trust , Toulouse , France .
  • Guttman , J. D. 1997 . Filtering postures: Local enforcement for global policies. Paper at the IEEE Symposium on Security and Privacy , Los Alamitos. Oakland , CA .
  • Haarslev , V. and R. Möller . 2001 . RACER system description. Paper at the First International Joint Conference on Automated Reasoning. Siena , Italy .
  • Hari , A. , S. Suri , and G. Parulkar . 2000 . Detecting and resolving packet filter conflicts. Paper at the 9th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Tel Aviv, Israel.
  • Liu , A. X. 2008 . Formal verification of firewall policies. Paper at the 2008 IEEE International Conference on Communications (ICC), Beijing, China.
  • Mayer , A. , A. Wool , and E. Ziskind . 2000 . Fang: A firewall analysis engine. Paper at Proceedings of the 2000 IEEE Symposium on Security and Privacy. Berkeley, CA.
  • Mayer , A. , A. Wool , and E. Ziskind . 2006 . Offline firewall analysis . International Journal on Information Security 5 ( 3 ): 125 – 144 .
  • Uribe , T. E. , and S. Cheung . 2004 . Automatic analysis of firewall and network intrusion detection system configurations. Paper at ACM Workshop on Formal Methods in Security Engineering, Washington, DC.
  • Wool , A. 2001 . Architecting the Lumeta firewall analyzer . In 10th Conference on USENIX Security Symposium – Volume 10 . Washington , DC : USENIX Association .
  • Wool , A. 2004 . The use and usability of direction-based filtering in firewalls . Computers and Security 23 : 459 – 468 .
  • Yuan , L. , H. Chen , J. Mai , C.-N. Chuah , Z. Su , and P. Mohapatra . 2006 . Fireman: A toolkit for firewall modeling and analysis. Paper at the IEEE Symposium on Security and Privacy. Berkeley, CA.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.