We have proposed an automata-based approach to study
security policies described by filtering rules. We have taken advantage of rigorous automata-based operators to study several
aspects of security policies in a simpler and more systematic
way than with other approaches. More precisely, we have
proposed: