Decision diagrams for XACML policy evaluation and management

C Ngo, Y Demchenko, C De Laat - Computers & Security, 2015 - Elsevier
One of the primary challenges to apply the XACML access control policy language in
applications is the performance problem of policy evaluation engines, particularly when they …

A formal model for network-wide security analysis

J Rab, P Matousek, O Rysavy… - 15th Annual IEEE …, 2008 - ieeexplore.ieee.org
Network designers perform challenging tasks with so many configuration options that it is
often hard or even impossible for a human to predict all potentially dangerous situations. In …

Improving NFA-based signature matching using ordered binary decision diagrams

L Yang, R Karim, V Ganapathy, R Smith - International Workshop on …, 2010 - Springer
Network intrusion detection systems (NIDS) make extensive use of regular expressions as
attack signatures. Internally, NIDS represent and operate these signatures using finite …

PfComp: A Verified Compiler for Packet Filtering Leveraging Binary Decision Diagrams

C Chavanon, F Besson, T Ninet - Proceedings of the 13th ACM SIGPLAN …, 2024 - dl.acm.org
We present PfComp, a verified compiler for stateless firewall policies. The policy is first
compiled into an intermediate representation taking the form of a binary decision diagram …

Multi-data-types interval decision diagrams for XACML evaluation engine

C Ngo, MX Makkes, Y Demchenko… - 2013 Eleventh Annual …, 2013 - ieeexplore.ieee.org
XACML policy evaluation efficiency is an important factor influencing the overall system
performance, especially when the number of policies grows. Some existing approaches on …

Fast, memory-efficient regular expression matching with NFA-OBDDs

L Yang, R Karim, V Ganapathy, R Smith - Computer Networks, 2011 - Elsevier
Modern network intrusion detection systems (NIDS) employ regular expressions as attack
signatures. Internally, NIDS represent and operate these regular expressions as finite …

Protection of Network Security Selector Secrecy in Outsourced Network Testing

S Alasmari, W Wang, A Lu… - 2023 32nd International …, 2023 - ieeexplore.ieee.org
With the emergence and fast development of cloud computing and outsourced services,
more and more companies start to use managed security service providers (MSSP) as their …

Graph-based data search

BD Hanner, J Amanatullah, TCM Wu - US Patent 8,442,931, 2013 - Google Patents
Computer based systems and methods for searching data transiting a network using a graph-
based search model. A set of rules that describe strings or patterns of data to be identified in …

An Open Source Solution for Testing NAT'd and Nested iptables Firewalls.

RM Marmorstein, P Kearns - LISA, 2005 - usenix.org
As firewalls have increased in power and flexibility, the complexity of configuring them
correctly has grown significantly. An error in the firewall configuration can compromise the …

[图书][B] Formal analysis of firewall policies

RM Marmorstein - 2008 - search.proquest.com
This dissertation describes a technique for formally analyzing a firewall security policy using
a quasi-reduced multiway decision diagram model. The analysis allows a system …