The rest of this paper is organized as follows. Section II presents related work on modeling security policies.
In Sections III and IV, we present preliminaries on firewalls
and automata, respectively. Section V shows how a table
of filtering rules describing a security policy is transformed
into an automaton that implements the security policy