1. Bartal, Y., Mayer, A., Nissim, K., and Wool, A. (1999). Firmato: A novel firewall management toolkit. In 20th IEEE Symposium on Security and Privacy, pages 17–31, Oakland, California.
2. Checkpoint (2004). Firewall-1. In http://www.checkpoint.com/.
3. Cuppens, F., Cuppens-Boulahia, N., and Miège, A. (2004a). Inheritance hierarchies in the Or-BAC Model and application in a network environment. In Second Foundations of Computer Security Workshop (FCS'04), Turku, Finland.
4. Cuppens, F., Cuppens-Boulahia, N., Sans, T., and Miège, A. (2004b). A Formal Approach to Specify and Deploy a Network Security Policy. In http://www.rennes.enst-bretagne.fr/fcuppens/articles/fast2004.pdf (full version of the paper presented at FAST 2004).
5. Cuppens, F. and Miège, A. (2003a). Conflict management in the Or-BAC model.