-
3
-
-
84871236007
-
Model-based firewall conformance testing
-
ser. LNCS, K. Suzuki and T. Higashino, Eds. Springer-Verlag
-
A. D. Brucker, L. Brügger, and B. Wolff, "Model-based firewall conformance testing," in Testcom/FATES 2008, ser. LNCS, K. Suzuki and T. Higashino, Eds. Springer-Verlag, 2008, no. 5047, pp. 103-118.
-
(2008)
Testcom/FATES 2008
, Issue.5047
, pp. 103-118
-
-
Brucker, A.D.1
Brügger, L.2
Wolff, B.3
-
4
-
-
0003503018
-
-
ser. LNCS. Springer-Verlag
-
T. Nipkow, L. C. Paulson, and M. Wenzel, Isabelle/HOL - A Proof Assistant for Higher-Order Logic, ser. LNCS. Springer-Verlag, 2002, vol. 2283.
-
(2002)
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
5
-
-
0003180840
-
A formulation of the simple theory of types
-
A. Church, "A formulation of the simple theory of types," Journal of Symbolic Logic, vol. 5, no. 2, pp. 56-68, 1940.
-
(1940)
Journal of Symbolic Logic
, vol.5
, Issue.2
, pp. 56-68
-
-
Church, A.1
-
7
-
-
24144442859
-
Symbolic test case generation for primitive recursive functions
-
ser. LNCS, J. Grabowski and B. Nielsen, Eds. Springer-Verlag
-
A. D. Brucker and B. Wolff, "Symbolic test case generation for primitive recursive functions," in Formal Approaches to Testing of Software, ser. LNCS, J. Grabowski and B. Nielsen, Eds. Springer-Verlag, 2004, no. 3395, pp. 16-32.
-
(2004)
Formal Approaches to Testing of Software
, Issue.3395
, pp. 16-32
-
-
Brucker, A.D.1
Wolff, B.2
-
8
-
-
38049018067
-
Test-sequence generation with HOL-TESTGEN - With an application to firewall testing
-
ser. LNCS, B. Meyer and Y. Gurevich, Eds. Springer-Verlag
-
-, "Test-sequence generation with HOL-TESTGEN - with an application to firewall testing," in TAP 2007: Tests And Proofs, ser. LNCS, B. Meyer and Y. Gurevich, Eds. Springer-Verlag, 2007, no. 4454, pp. 149-168.
-
(2007)
TAP 2007: Tests and Proofs
, Issue.4454
, pp. 149-168
-
-
-
9
-
-
33749044427
-
Policy segmentation for intelligent firewall testing
-
A. El-Atawy, K. Ibrahim, H. Hamed, and E. Al-Shaer, "Policy segmentation for intelligent firewall testing," in NPSec 05. IEEE Computer Society, 2005, pp. 67-72.
-
(2005)
NPSec 05. IEEE Computer Society
, pp. 67-72
-
-
El-Atawy, A.1
Ibrahim, K.2
Hamed, H.3
Al-Shaer, E.4
-
10
-
-
34748884299
-
An automated framework for validating firewall policy enforcement
-
A. El-Atawy, T. Samak, Z. Wali, E. Al-Shaer, F. Lin, C. Pham, and S. Li, "An automated framework for validating firewall policy enforcement," in POLICY '07. IEEE Computer Society, 2007, pp. 151-160.
-
(2007)
POLICY '07. IEEE Computer Society
, pp. 151-160
-
-
El-Atawy, A.1
Samak, T.2
Wali, Z.3
Al-Shaer, E.4
Lin, F.5
Pham, C.6
Li, S.7
-
11
-
-
84891450004
-
Specification-based testing of firewalls
-
ser. LNCS, D. Bjørner, M. Broy, and A. V. Zamulin, Eds. Springer-Verlag
-
J. Jürjens and G. Wimmel, "Specification-based testing of firewalls," in Ershov Memorial Conference, ser. LNCS, D. Bjørner, M. Broy, and A. V. Zamulin, Eds., vol. 2244. Springer-Verlag, 2001, pp. 308-316.
-
(2001)
Ershov Memorial Conference
, vol.2244
, pp. 308-316
-
-
Jürjens, J.1
Wimmel, G.2
-
12
-
-
33745830534
-
Engineering with logic: Hol spec- ification and symbolic-evaluation testing for TCP implementations
-
J. G. Morrisett and S. L. P. Jones, Eds. ACM Press
-
S. Bishop, M. Fairbairn, M. Norrish, P. Sewell, M. Smith, and K. Wansbrough, "Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations," in POPL, J. G. Morrisett and S. L. P. Jones, Eds. ACM Press, 2006, pp. 55-66.
-
(2006)
POPL
, pp. 55-66
-
-
Bishop, S.1
Fairbairn, M.2
Norrish, M.3
Sewell, P.4
Smith, M.5
Wansbrough, K.6
-
13
-
-
85094318018
-
Firewall analysis with policy-based host classification
-
USENIX Association
-
R. Marmorstein and P. Kearns, "Firewall analysis with policy-based host classification," in LISA. USENIX Association, 2006, pp. 4-4.
-
(2006)
LISA
, pp. 4-4
-
-
Marmorstein, R.1
Kearns, P.2
-
14
-
-
33745883651
-
-
version 2.0 [Online]. Available
-
"eXtensible Access Control Markup Language (XACML), version 2.0," 2005. [Online]. Available: http://docs.oasis-open.org/xacml/2.0/ XACML-2.0-OS-NORMATIVE.zip
-
(2005)
EXtensible Access Control Markup Language (XACML)
-
-
-
15
-
-
57049148622
-
Automated XACML policy reconfiguration for evaluation optimisation
-
B. D. Win, S.-W. Lee, and M. Monga, Eds. ACM Press
-
P. Miseldine, "Automated XACML policy reconfiguration for evaluation optimisation," in Software Engineering for Secure Systems (SESS), B. D. Win, S.-W. Lee, and M. Monga, Eds. ACM Press, 2008, pp. 1-8.
-
(2008)
Software Engineering for Secure Systems (SESS)
, pp. 1-8
-
-
Miseldine, P.1
-
17
-
-
0032599434
-
Communications software design for testability: Specification transformations and testability measures
-
R. Dssouli, K. Karoui, K. Saleh, and O. Cherkaoui, "Communications software design for testability: specification transformations and testability measures," Information and Software Technology, vol. 41, no. 11-12, pp. 729-743, 1999.
-
(1999)
Information and Software Technology
, vol.41
, Issue.11-12
, pp. 729-743
-
-
Dssouli, R.1
Karoui, K.2
Saleh, K.3
Cherkaoui, O.4
-
18
-
-
0742268971
-
Testability transformation
-
M. Harman, L. Hu, R. Hierons, J. Wegener, H. Sthamer, A. Baresel, and M. Roper, "Testability transformation," IEEE Trans. Softw. Eng., vol. 30, no. 1, pp. 3-16, 2004.
-
(2004)
IEEE Trans. Softw. Eng.
, vol.30
, Issue.1
, pp. 3-16
-
-
Harman, M.1
Hu, L.2
Hierons, R.3
Wegener, J.4
Sthamer, H.5
Baresel, A.6
Roper, M.7
-
19
-
-
25844493570
-
Branch-coverage testability transformation for unstructured programs
-
R. M. Hierons, M. Harman, and C. Fox, "Branch-coverage testability transformation for unstructured programs," Comput. J., vol. 48, no. 4, pp. 421-436, 2005.
-
(2005)
Comput. J.
, vol.48
, Issue.4
, pp. 421-436
-
-
Hierons, R.M.1
Harman, M.2
Fox, C.3
-
21
-
-
43049100010
-
Testability transformation - Program transformation to improve testability
-
ser. LNCS, R. M. Hierons, J. P. Bowen, and M. Harman, Eds. Springer-Verlag
-
M. Harman, A. Baresel, D. Binkley, R. M. Hierons, L. Hu, B. Korel, P. McMinn, and M. Roper, "Testability transformation - program transformation to improve testability," in Formal Methods and Testing, ser. LNCS, R. M. Hierons, J. P. Bowen, and M. Harman, Eds., vol. 4949. Springer-Verlag, 2008, pp. 320-344.
-
(2008)
Formal Methods and Testing
, vol.4949
, pp. 320-344
-
-
Harman, M.1
Baresel, A.2
Binkley, D.3
Hierons, R.M.4
Hu, L.5
Korel, B.6
McMinn, P.7
Roper, M.8
-
22
-
-
25144490696
-
A verification approach for applied system security
-
A. D. Brucker and B. Wolff, "A verification approach for applied system security," International Journal on Software Tools for Technology Transfer (STTT), vol. 7, no. 3, pp. 233-247, 2005.
-
(2005)
International Journal on Software Tools for Technology Transfer (STTT)
, vol.7
, Issue.3
, pp. 233-247
-
-
Brucker, A.D.1
Wolff, B.2
-
23
-
-
84886839908
-
An MDA framework supporting OCL
-
A. D. Brucker, J. Doser, and B. Wolff, "An MDA framework supporting OCL," Electronic Communications of the EASST, vol. 5, 2006.
-
(2006)
Electronic Communications of the EASST
, vol.5
-
-
Brucker, A.D.1
Doser, J.2
Wolff, B.3
|