共 14 条
[2]
Firewall policy advisor for anomaly discovery and rule editing
[J].
INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL,
2003, 118
:17-30
[3]
Using argumentation logic for firewall policy specification and analysis
[J].
LARGE SCALE MANAGEMENT OF DISTRIBUTED SYSTEMS, PROCEEDINGS,
2006, 4269
:185-196
[4]
Using Argumentation Logic for Firewall Configuration Management
[J].
2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2,
2009,
:180-+
[5]
Firmato:: A novel firewall management toolkit
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:17-31
[7]
Chomsiri T., 2006, P 2006 INT C SEC MAN
[9]
Analysis of Firewall Policy Rules Using Data Mining Techniques
[J].
2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2,
2006,
:305-+
[10]
Filtering postures: Local enforcement for global policies
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:120-129