Policy-Based Management: Bridging the Gap
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Filtering postures: local enforcement for global policies
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Fang: A Firewall Analysis Engine
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Automatic Enforcement of Security in Computer Networks
Proceedings of the 2007 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the sixth SoMeT_07
Network Security: Formal and Optimized Configuration
Proceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_10
Hi-index | 0.00 |
A firewall is one of the major security tools available for protecting computer domains. Today, almost all companies have at least one firewall to filter incoming and outgoing traffic according to some requirements called security policy. The configuration of firewalls is however complex and error prone. During the last years, many techniques and tools have been proposed to analyze firewalls. However, most of existing worksare informaland the formalfoundationof firewall is still a missing part. The goal of this paper is to present an overview of the most important problems related to the firewall configuration and analysis. Also, it proposes a formal language for the specification and the verification of firewalls.