메뉴 건너뛰기




Volumn 3502, Issue , 2005, Pages 226-241

Firewall conformance testing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; ERROR CORRECTION; PROBLEM SOLVING; SECURITY OF DATA; TOPOLOGY; COMPUTER SYSTEM FIREWALLS; ELECTRIC NETWORK TOPOLOGY; MOBILE SECURITY; SECURITY SYSTEMS;

EID: 24944508565     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11430230_16     Document Type: Conference Paper
Times cited : (31)

References (16)
  • 3
    • 24944514186 scopus 로고    scopus 로고
    • Firmato: A novel firewall management toolkit
    • [BMNW03], Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel, February
    • [BMNW03] Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. Technical report, Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel, February 2003.
    • (2003) Technical Report
    • Bartal, Y.1    Mayer, A.J.2    Nissim, K.3    Wool, A.4
  • 4
    • 0017973244 scopus 로고
    • Testing software design modeled by finite-state machines
    • [Cho78], May
    • [Cho78] Tsun S. Chow. Testing software design modeled by finite-state machines. In IEEE Transactions on Software Engineering, Vol. SE-4, No 3, pages 178-187, May 1978.
    • (1978) IEEE Transactions on Software Engineering , vol.SE-4 , Issue.3 , pp. 178-187
    • Chow, T.S.1
  • 7
    • 0010825874 scopus 로고
    • State-identification experiments in finite automata
    • [Gil61]
    • [Gil61] A. Gill. State-identification experiments in finite automata. In Information and Control, vol. 4, pages 132-154, 1961.
    • (1961) Information and Control , vol.4 , pp. 132-154
    • Gill, A.1
  • 9
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • [Gut97], Oakland, CA. IEEE Computer Society Press
    • [Gut97] J. D. Guttman. Filtering postures: Local enforcement for global policies. In 1997 IEEE Symposium on Security and Privacy, pages 120-129, Oakland, CA, 1997. IEEE Computer Society Press.
    • (1997) 1997 IEEE Symposium on Security and Privacy , pp. 120-129
    • Guttman, J.D.1
  • 10
    • 34748874365 scopus 로고    scopus 로고
    • Firewall penetration testing
    • [Hae97], The George Washington University Cyberspace Policy Institute, 2033 K St, Suite 340N, Washington, DC, 20006, US, January
    • [Hae97] Reto E. Haeni. Firewall penetration testing. Technical report, The George Washington University Cyberspace Policy Institute, 2033 K St, Suite 340N, Washington, DC, 20006, US, January 1997.
    • (1997) Technical Report
    • Haeni, R.E.1
  • 14
    • 0030089329 scopus 로고    scopus 로고
    • How to perform effective firewall testing
    • [Sch96]
    • [Sch96] E. Schultz. How to perform effective firewall testing. In Computer Security Journal, vol. 12, no. 1, pages 47-54, 1996.
    • (1996) Computer Security Journal , vol.12 , Issue.1 , pp. 47-54
    • Schultz, E.1
  • 15
    • 0023834225 scopus 로고
    • A protocol test generation procedure
    • [SD88]
    • [SD88] Krishan Sabnani and Anton Dahbura. A protocol test generation procedure. In Computer Networks and ISDN Systems 15, pages 285-297, 1988.
    • (1988) Computer Networks and ISDN Systems , vol.15 , pp. 285-297
    • Sabnani, K.1    Dahbura, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.