Management and Verification of Firewall and Router Access Lists.
Ahmed A. HassanLadislav HudecPublished in: Comput. Artif. Intell. (2004)
Keyphrases
- security enforcement
- information systems
- information management
- neural network
- storage management
- information access
- network traffic
- network management
- end to end
- intrusion detection system
- knowledge management
- java card
- network security
- model checking
- access control
- decision support
- decision making
- intrusion detection
- customer relationship management
- signature verification
- formal verification
- information technology
- asynchronous circuits
- verification method
- databases