Author:
Vijay M.,Devika R.,Priyangha B. S.
Publisher
Springer Nature Singapore
Reference22 articles.
1. Yuan L, Chen H, Mai J, Chuah C, Su Z, Mohapatra P, Davis C (2006) Fireman: a Toolkit for firewall modeling and analysis. In: Proceeding of IEEE symposium security and privacy, p 15
2. Lupu E, Sloman M (1999) Conflicts in policy-based distribute systems management. IEEE Trans Softw Eng 25(6):852–869
3. Hu H, Ahn G, Kulkarni K (2011) Anomaly discovery and resolution in web access control policies. In: Proceedings of 16th ACM symposium access control models and technologies, pp 165–174
4. Yuan L, Chuah C, Mohapatra P (2007) ProgME: towards programmable network measurement. ACM SIGCOMM Comput Comm Rev 37(4):108
5. Bentley J, Ottmann T (1979) Algorithms for reporting and counting geometric intersections. IEEE Trans Comput 28(9)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey on Firewall for cloud security with Anomaly detection in Firewall Policy;2023 International Conference on Artificial Intelligence and Smart Communication (AISC);2023-01-27