共 50 条
- [1] Localizing Firewall Security Policies 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 194 - 209
- [2] Firewall security: Policies, testing and performance evaluation 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 116 - 121
- [3] An Automated Validation Method for Security Policies: the firewall case FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 291 - 294
- [4] Towards an Automated Firewall Security Policies Validation Process CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 267 - 272
- [5] Automatic Verification of Conformance of Firewall Configurations to Security Policies ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 525 - +
- [7] Multi-constraint Security Policies for Delegated Firewall Administration MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 123 - +
- [9] Design and implementation of firewall security policies using Linux iptables Journal of Engineering Science and Technology Review, 2019, 12 (01): : 80 - 86
- [10] Directed Acyclic Graph Modeling of Security Policies for Firewall Testing 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 393 - 398