A formal approach for testing security rules
暂无分享,去创建一个
Ana R. Cavalli | Nora Cuppens-Boulahia | Frédéric Cuppens | Jean-Marie Orset | Wissam Mallouli | F. Cuppens | N. Cuppens-Boulahia | A. Cavalli | W. Mallouli | Jean-Marie Orset | Wissam Mallouli
[1] Alfred V. Aho,et al. An optimization technique for protocol conformance test generation based on UIO sequences and rural Chinese postman tours , 1991, IEEE Trans. Commun..
[2] David Lee,et al. Principles and methods of testing finite state machines-a survey , 1996, Proc. IEEE.
[3] Ana R. Cavalli,et al. Hit-or-Jump: An algorithm for embedded testing with applications to IN services , 1999, FORTE.
[4] Jorge Lobo,et al. A Policy Description Language , 1999, AAAI/IAAI.
[5] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[6] Emil C. Lupu,et al. A Survey of Policy Specification Approaches , 2002 .
[7] Frédéric Cuppens,et al. Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[8] David A. Basin,et al. Firewall Conformance Testing , 2005, TestCom.
[9] Roland Groz,et al. Test Generation for Network Security Rules , 2006, TestCom.
[10] Nora Cuppens-Boulahia,et al. Analysis of Policy Anomalies on Distributed Network Security Setups , 2006, ESORICS.
[11] Nora Cuppens-Boulahia,et al. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies , 2006, SAFECOMP.
[12] Nora Cuppens-Boulahia,et al. High Level Conflict Management Strategies in Advanced Access Control Models , 2007, ICS@SYNASC.