2009
DOI: 10.1016/j.infsof.2008.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Model-Based Development of firewall rule sets: Diagnosing model inconsistencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(23 citation statements)
references
References 23 publications
0
22
0
1
Order By: Relevance
“…Hence, it is crucial to validate the models before transformations are executed. MDA does not provide any diagnosis stage as an integrated part of the architecture, although this idea has already presented in other studies [6] where the MDA architecture is extended with diagnosis points before model transformations.…”
Section: Framework Overviewmentioning
confidence: 99%
“…Hence, it is crucial to validate the models before transformations are executed. MDA does not provide any diagnosis stage as an integrated part of the architecture, although this idea has already presented in other studies [6] where the MDA architecture is extended with diagnosis points before model transformations.…”
Section: Framework Overviewmentioning
confidence: 99%
“…Thus, the proposed diagnosis stage is in reality a (static) verification one. This diagnosis stage has been proposed in earlier works [1], and is not the focus of the paper. Fig.…”
Section: Mda For Firewall Acl Designmentioning
confidence: 99%
“…Let ACL f be a firewall ACL consisting of f+1 rules, Firewalls have to face many problems in modern networks. Two of the most important ones are the high complexity of ACL design [1] and ACL consistency diagnosis [2,3]. Networks have different access control requirements which must be translated by a network administrator into firewall ACLs.…”
Section: Introductionmentioning
confidence: 99%
“…An extensive analysis of the market-leader firewall languages was presented in (Pozo1, 2009). In the analysis it was shown that IP addresses can be expressed by all of them in octets with a CIDR value (IP blocks), port numbers as naturals or intervals of naturals, and protocols as a natural number.…”
Section: Inconsistency Isolation Processmentioning
confidence: 99%
“…In the following sections, a different data structure is going to be proposed for each selector, based on the analysis of the particular data set that each one can store (Pozo1, 2009). The objective is to find or design ADTs capable of doing searches in worst case time complexity better or equal than O(logm).…”
Section: Inconsistency Isolation Processmentioning
confidence: 99%