The 5 linked references in paper T. Myo T., Т. Мьо Т. (2016) “Формальная модель анализа ошибок конфигурирования межсетевых экранов // A Formal Model to Analyse the Firewall Configuration Errors” / spz:neicon:technomag:y:2015:i:6:p:305-328

  1. Al-Shaer E., Hamed H., Boutaba R., Hasan M. Conflict classification and analysis of distributed firewall policies // IEEE Journal on Selected Areas in Communications. 2005. Vol. 23, no. 10. P. 2069-2084. DOI: 10.1109/JSAC.2005.854119
  2. Al-Shaer E., Marrero W., El-Atawy A., Elbadawi K. Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security // 17th IEEE International Conference on Network Protocols (ICNP). IEEE Publ., 2009. P. 123-132. DOI: 10.1109/ICNP.2009.5339690
  3. Bartal Y., Mayer A.J., N issim K., Wool A. Firmato: A novel firewall managment toolkit // ACM Transactions on Computer Systems. 2004. Vol. 22, no. 4. C. 381-420. DOI: 10.1145/1035582.1035583
  4. Gouda M.G., Liu A.X. A model of stateful firewalls and its properties // Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN'05), Japan, June 2005. IEEE Publ., 2005. P. 128-137. DOI: 10.1109/DSN.2005.9
  5. Liu A.X., Gouda M.G, Ma H.H., HH. N gu A. Firewall Q ueries // Principles of Distributed Systems. OPODIS 2004 / ed. by T. Higashino. Springer Berlin Heidelberg, 2005. P. 197212. (Ser. Lecture Notes in Computer Science; vol. 3544.). DOI: 10.1007/11516798_15