1. Abrams, M., Bailey, D.: Abstraction and refinement of layered security policy. In: Abrams, M., Jajodia, S., Podell, H. (eds.) Information Security: An Integrated Collection of Essays, pp. 126–136. IEEE Computer Society Press, Los Alamitos (1994)
2. Bartal Y., Mayer A.J., Nissim K., Wool A.: Firmato: a novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4), 381–420 (2004)
3. Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., Surendran, A., D.M., Jr.: Automatic management of network security policy. In: DARPA Information Survivability Conference and Exposition (DISCEX II’01), vol. 2 (2001)
4. Common Criteria Project: Common Criteria for Information Technology Security Evaluation (CC 2.2), Part 2: Security functional requirements (2004)
5. Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miége, A.: A formal approach to specify and deploy a network security policy. In: Formal Aspects in Security and Trust (FAST 2004) (2004)