2010 IEEE Second International Conference on Social Computing 2010
DOI: 10.1109/socialcom.2010.126
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Conformance Verification of Distributed Firewalls to Security Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Ben Youssef et al [19] verify the conformance of firewall configurations with respect to the security policies using a satisfiability solver modulo theories (SMT). They extend their work in order to support the case of distributed firewalls [20].…”
Section: Related Workmentioning
confidence: 99%
“…Ben Youssef et al [19] verify the conformance of firewall configurations with respect to the security policies using a satisfiability solver modulo theories (SMT). They extend their work in order to support the case of distributed firewalls [20].…”
Section: Related Workmentioning
confidence: 99%
“…In order to simplify the algorithm, only the 5 domains of the rules are considered in the rule collision detection: src_ip, dest_ip, src_port, dest_port and protocol [9]. The src_port and dest_port may range from 0~65535, while the actual application typically takes only a limited range.…”
Section: A Audit Scheme Which Based On Policy Treementioning
confidence: 99%