

Privacy Preserving Firewall Optimization Over Cross Domains
Abstract
References
E. Al-Shaer and H. Hamed. Discovery of policy anomalies in distributed firewalls.In IEEE INFOCOM, pages 2605–2616, 2004.
J. Brickell and V. Shmatikov.Privacy-preserving graph algorithms in the semi- honest model. In ASIACRYPT, pages 236–252, 2010.
J. Cheng, H. Yang, S. H. Wong, and S. Lu.Design and implementation of cross- domain cooperative firewall.In IEEE ICNP, 2007.
M. G. Gouda and A. X. Liu. Firewall design: consistency, completeness and compactness. In IEEE ICDCS, pages 320–327, 2004.
X. Liu and M. G. Gouda.Diverse firewall design.IEEE TPDS, 19(8), 2008.
Jo.ao B. D. Cabrera1, Carlos Guti´errez and Raman K. Mehra,” InfrastructuresandAlgorithms for Distributed Anomaly-Based Intrusion Detection in Mobile Ad-Networks”
S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy,” TechnicalReport99-15, Dept. of Computer Eng.,Chalmers Univ. of Technology, 2000.
FeiChen,BezawadaBruhadeshwar& Alex X. Liu,“ Cross-Domain Privacy Preserving Cooperative Firewall Optimization ”,IEEE TRANSACTIONS ON NETWORKING VOL:21 NO 3 YEAR 2013.
Hongxin Hu, Gail - JoonAhn and KetanKulkarni researched on “Detecting and Resolving Firewall Policy Anomalies” , IEEE Transactions on DependableAnd Secure Computing, VOL. 9,NO. 3, MAY/JUNE 2012.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.