This paper considers an optimisation problem encountered in the implementation of traffic policies on network routers, that of attempting to minimise the time taken to process a sequence of rules in an Access Control List (ACL). The problem is formulated and shown to be NP-complete. Exact and heuristic solution methods are introduced and compared and computational results given. Additional complications and extensions are considered in conclusion. The full paper can be found in [1
AbstractACL acts as an important role in network access control, network traffic flow identify and n...
An ACL (access control list) is one of a few tools that network administrators often use to restrict...
International audienceIn this paper we address the problem of fast and fair transmission of flows in...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
Among the various options for implementing Internet packet filters in the form of Access Control Lis...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
This paper presents a modelling and simulation framework for analysing Access Control List (ACL) imp...
The inclusion of multiple metrics in a routing computation is called policy-based routing. Previous ...
Organizations can no longer isolate their networks from the rest of the world and still remain compe...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
This electronic version was submitted by the student author. The certified thesis is available in th...
This paper introduces a new method to improve the performance of list oriented firewall systems. Spe...
AbstractACL acts as an important role in network access control, network traffic flow identify and n...
An ACL (access control list) is one of a few tools that network administrators often use to restrict...
International audienceIn this paper we address the problem of fast and fair transmission of flows in...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
Among the various options for implementing Internet packet filters in the form of Access Control Lis...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
This paper presents a modelling and simulation framework for analysing Access Control List (ACL) imp...
The inclusion of multiple metrics in a routing computation is called policy-based routing. Previous ...
Organizations can no longer isolate their networks from the rest of the world and still remain compe...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
This electronic version was submitted by the student author. The certified thesis is available in th...
This paper introduces a new method to improve the performance of list oriented firewall systems. Spe...
AbstractACL acts as an important role in network access control, network traffic flow identify and n...
An ACL (access control list) is one of a few tools that network administrators often use to restrict...
International audienceIn this paper we address the problem of fast and fair transmission of flows in...