Application of the XTT rule-based model for formal design and verification of Internet security systems

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper presents a concept of support for the design and analysis of Internet security systems with a rule-based methodology. It considers a web security architecture, including a network and application-level firewall with intrusion detection systems. The XTT methodology allows for hierarchical design, and on-line analysis of rule-based systems. It is applied using the Unified Firewall Model, allowing for implementationagnostic formal design and verification of firewalls. UFM extension aimed at integration with ModSecurity HTTP firewall are introduced. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Nalepa, G. J. (2007). Application of the XTT rule-based model for formal design and verification of Internet security systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4680 LNCS, pp. 81–86). Springer Verlag. https://doi.org/10.1007/978-3-540-75101-4_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free