期刊名称:Journal of Theoretical and Applied Information Technology
印刷版ISSN:1992-8645
电子版ISSN:1817-3195
出版年度:2014
卷号:59
期号:2
出版社:Journal of Theoretical and Applied
摘要:Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This policy requires automated tools in order to create a suitable environment for configuring or deploying safely a policy target. Most researchers are interested in detection of conflicts or the problem of optimization of policies firewall while few of them have proposed deployment strategies for two important types of edition policies. We have already proposed a correct algorithm for the deployment type I [0]. In this work we study one of these strategies that falls within the type II edition policies. We show that the proposed solution of type II edition [1] is not fully correct and lead to security vulnerabilities, and then we offer a few corrections and improvements for this type of editing.