-
1
-
-
84964467772
-
Automatic management of network security policy
-
+01]
-
+01] J. Burns, A. Cheng, P. Gurung, S. Rajagopalan, P. Rao, D. Rosenbluth, A.V. Surendran, and D.M. Martin. Automatic management of network security policy. In Proceedings of DISCEX II, 2001.
-
(2001)
Proceedings of DISCEX II
-
-
Burns, J.1
Cheng, A.2
Gurung, P.3
Rajagopalan, S.4
Rao, P.5
Rosenbluth, D.6
Surendran, A.V.7
Martin, D.M.8
-
2
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
[BMNW99]
-
[BMNW99] Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pages 17-31, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
3
-
-
24944514186
-
Firmato: A novel firewall management toolkit
-
[BMNW03], Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel, February
-
[BMNW03] Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. Technical report, Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel, February 2003.
-
(2003)
Technical Report
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
4
-
-
0017973244
-
Testing software design modeled by finite-state machines
-
[Cho78], May
-
[Cho78] Tsun S. Chow. Testing software design modeled by finite-state machines. In IEEE Transactions on Software Engineering, Vol. SE-4, No 3, pages 178-187, May 1978.
-
(1978)
IEEE Transactions on Software Engineering
, vol.SE-4
, Issue.3
, pp. 178-187
-
-
Chow, T.S.1
-
6
-
-
0016520230
-
Toward a theory of test data selection
-
[GG75], June
-
[GG75] John B. Goodenough and Susan L. Gerhart. Toward a theory of test data selection. In IEEE Transactions on Software Engineering (TSE), Volume 1, Number 2, pages 156-173, June 1975.
-
(1975)
IEEE Transactions on Software Engineering (TSE)
, vol.1
, Issue.2
, pp. 156-173
-
-
Goodenough, J.B.1
Gerhart, S.L.2
-
7
-
-
0010825874
-
State-identification experiments in finite automata
-
[Gil61]
-
[Gil61] A. Gill. State-identification experiments in finite automata. In Information and Control, vol. 4, pages 132-154, 1961.
-
(1961)
Information and Control
, vol.4
, pp. 132-154
-
-
Gill, A.1
-
9
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
[Gut97], Oakland, CA. IEEE Computer Society Press
-
[Gut97] J. D. Guttman. Filtering postures: Local enforcement for global policies. In 1997 IEEE Symposium on Security and Privacy, pages 120-129, Oakland, CA, 1997. IEEE Computer Society Press.
-
(1997)
1997 IEEE Symposium on Security and Privacy
, pp. 120-129
-
-
Guttman, J.D.1
-
10
-
-
34748874365
-
Firewall penetration testing
-
[Hae97], The George Washington University Cyberspace Policy Institute, 2033 K St, Suite 340N, Washington, DC, 20006, US, January
-
[Hae97] Reto E. Haeni. Firewall penetration testing. Technical report, The George Washington University Cyberspace Policy Institute, 2033 K St, Suite 340N, Washington, DC, 20006, US, January 1997.
-
(1997)
Technical Report
-
-
Haeni, R.E.1
-
13
-
-
0037984544
-
-
+02], June
-
+02] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. RFC 3261 SIP: Session initiation protocol. http://www.ietf.org/rfc/rfc3261.txt, June 2002.
-
(2002)
RFC 3261 SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
14
-
-
0030089329
-
How to perform effective firewall testing
-
[Sch96]
-
[Sch96] E. Schultz. How to perform effective firewall testing. In Computer Security Journal, vol. 12, no. 1, pages 47-54, 1996.
-
(1996)
Computer Security Journal
, vol.12
, Issue.1
, pp. 47-54
-
-
Schultz, E.1
|