Automatic verification of conformance of firewall configurations to security policies | IEEE Conference Publication | IEEE Xplore