Author:
Senn Diana,Basin David,Caronni Germano
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., Surendran, A.V., Martin, D.M.: Automatic management of network security policy. In: Proceedings of DISCEX II (2001)
2. Bartal, Y., Mayer, A.J., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. In: IEEE Symposium on Security and Privacy, pp. 17–31 (1999)
3. Bartal, Y., Mayer, A.J., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. Technical report, Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel (February 2003)
4. Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Transactions on Software Engineering SE-4(3), 178–187 (1978)
5. Fuller, V., Li, T., Yu, J., Varadhan, K.: RFC 1519: Classless inter-domain routing (CIDR): an address assignment and aggregation strategy (September 1993), http://www.ietf.org/rfc/rfc1519.txt
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Online and Offline Security Policy Assessment;Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats;2016-10-28
2. Model-based security testing: a taxonomy and systematic classification;Software Testing, Verification and Reliability;2015-07-24
3. A Formal Approach to Automatic Testing of Security Policies Specified in XACML;Foundations and Practice of Security;2015
4. hol-TestGen/fw;Theoretical Aspects of Computing – ICTAC 2013;2013
5. Firewall policy change-impact analysis;ACM Transactions on Internet Technology;2012-03