Author:
Guttman Joshua D.,Herzog Amy L.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference22 articles.
1. Bartal Y, Mayer A, Nissim K, Wool A (1999) Firmato: a novel firewall management toolkit. In: Proceedings of the IEEE symposium on security and privacy. IEEE Press, New York
2. Bellovin S (1996) Problem areas for the IP security protocols. In: Proceedings of the 6th USENIX UNIX security symposium, July 1996. Also at ftp://ftp.research.att.com/dist/smb/badesp.ps
3. Brace KS, Rudell RL, Bryant RE (1990) Efficient implementation of a BDD package. In: 27th ACM/IEEE design automation conference, pp 40–45
4. Bryant RE (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans Comput C-35(8):677–691
5. Cisco Systems (1994) Router Products Command Reference, 10th edn. Chapters 10 to 17 (especially Chapter 16). For more recent information, see http://www.cisco.com/univercd/
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Specifying and Verifying Information Flow Control in SELinux Configurations;ACM Transactions on Privacy and Security;2024-08-29
2. Automating the configuration of firewalls and channel protection systems in virtual networks;2023 IEEE 9th International Conference on Network Softwarization (NetSoft);2023-06-19
3. A Survey of Research on Network Security Management Model;2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC);2022-12-02
4. Short Paper;Proceedings of the 2nd Workshop on Cyber-Security Arms Race;2020-11-09
5. Systematic Literature Review on Usability of Firewall Configuration;ACM Computing Surveys;2018-11-30