Author:
Alsaleh Mohammed Noraden,Al-Shaer Ehab,El-Atawy Adel
Publisher
Springer International Publishing
Reference24 articles.
1. Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. In: Proceedings of IEEE INFOCOM’04, Hong Kong (2004)
2. Al-Shaer, E., Hamed, H.: Taxonomy of conflicts in network security policies. IEEE Commun. Mag. 44(3), 134–141 (2006)
3. Al-Shaer, E., Marrero, W., El-Atawy, A., Elbadawi, K.: Network configuration in a box: towards end-to-end verification of network reachability and security. In: ICNP, Princeton, pp. 123–132 (2009)
4. Alimi, R., Wang, Y., Yang, Y.R.: Shadow configuration as a network management primitive. In: SIGCOMM’08: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, Seattle, pp. 111–122. ACM, New York (2008)
5. Ballani, H., Francis, P.: Conman: a step towards network manageability. SIGCOMM Comput. Commun. Rev. 37(4), 205–216 (2007)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Integrated Modeling Workflow for Security Assurance;Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques;2016