Towards network security policy generation for configuration analysis and testing




FREE-DOWNLOAD T Samak, A El-Atawy… – … of the 2nd ACM workshop on …, 2009
ABSTRACT Access-control lists are an essential part in the security frame- work of any
system. Researchers are always in need to have a repository of ready made policies for conducting
research and development. Such policies, especially firewall policies which are the focus