@article{994, author = {F. Bezzazi, A.Kartit, M. El Marraki, D. Aboutajdine}, title = {Safe Algorithm for Firewall Policy Deployment}, journal = {Journal of Information Security Research}, year = {2012}, volume = {3}, number = {4}, doi = {}, url = {http://www.dline.info/jisr/fulltext/v3n4/2.pdf}, abstract = {The problem of modern network security becomes more and more difficult, and request security methods more efficient and adapted to current circumstances. Since the firewall is one of the most used components in any network architectures, policy deployment is a very important step to move from one policy to another without presenting any flaws. For this case, researchers have proposed several algorithms that solve this problem safely. In this paper we will see two types of policy deployment often used, study one of the type II language, and show that it can provide some security holes. We will propose some changes to transform this strategy to a new very efficient algorithm, which respect the safety criteria.}, }