{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:34:56Z","timestamp":1742913296667,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540260547"},{"type":"electronic","value":"9783540320760"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11430230_16","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T15:13:11Z","timestamp":1279033991000},"page":"226-241","source":"Crossref","is-referenced-by-count":24,"title":["Firewall Conformance Testing"],"prefix":"10.1007","author":[{"given":"Diana","family":"Senn","sequence":"first","affiliation":[]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[]},{"given":"Germano","family":"Caronni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., Surendran, A.V., Martin, D.M.: Automatic management of network security policy. In: Proceedings of DISCEX II (2001)","DOI":"10.1109\/DISCEX.2001.932156"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bartal, Y., Mayer, A.J., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. In: IEEE Symposium on Security and Privacy, pp. 17\u201331 (1999)","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"16_CR3","unstructured":"Bartal, Y., Mayer, A.J., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. Technical report, Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel (February 2003)"},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"SE-4","author":"T.S. Chow","year":"1978","unstructured":"Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Transactions on Software Engineering\u00a0SE-4(3), 178\u2013187 (1978)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Fuller, V., Li, T., Yu, J., Varadhan, K.: RFC 1519: Classless inter-domain routing (CIDR): an address assignment and aggregation strategy (September 1993), http:\/\/www.ietf.org\/rfc\/rfc1519.txt","DOI":"10.17487\/rfc1519"},{"issue":"2","key":"16_CR6","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TSE.1975.6312836","volume":"1","author":"J.B. Goodenough","year":"1975","unstructured":"Goodenough, J.B., Gerhart, S.L.: Toward a theory of test data selection. IEEE Transactions on Software Engineering (TSE)\u00a01(2), 156\u2013173 (1975)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/S0019-9958(61)80003-X","volume":"4","author":"A. Gill","year":"1961","unstructured":"Gill, A.: State-identification experiments in finite automata. Information and Control\u00a04, 132\u2013154 (1961)","journal-title":"Information and Control"},{"key":"16_CR8","volume-title":"Introduction to the Theory of Finite-state Machines","author":"A. Gill","year":"1962","unstructured":"Gill, A.: Introduction to the Theory of Finite-state Machines. McGraw-Hill, New York (1962)"},{"key":"16_CR9","first-page":"120","volume-title":"1997 IEEE Symposium on Security and Privacy","author":"J.D. Guttman","year":"1997","unstructured":"Guttman, J.D.: Filtering postures: Local enforcement for global policies. In: 1997 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120\u2013129. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"16_CR10","unstructured":"Haeni, R.E.: Firewall penetration testing. Technical report, The George Washington University Cyberspace Policy Institute, 2033 K St, Suite 340N, Washington, DC, 20006, US (January 1997)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/3-540-45575-2_31","volume-title":"Perspectives of System Informatics","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J., Wimmel, G.: Specification based testing: Towards practice. In: Ershov, A. (ed.) PSI 2001. LNCS, vol.\u00a02244, p. 287. Springer, Heidelberg (2001)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Fang: A firewall analysis engine. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (S&P 2000), May 2000, pp. 177\u2013187 (2000)","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: RFC 3261 SIP: Session initiation protocol (June 2002), http:\/\/www.ietf.org\/rfc\/rfc3261.txt","DOI":"10.17487\/rfc3261"},{"issue":"1","key":"16_CR14","first-page":"47","volume":"12","author":"E. Schultz","year":"1996","unstructured":"Schultz, E.: How to perform effective firewall testing. Computer Security Journal\u00a012(1), 47\u201354 (1996)","journal-title":"Computer Security Journal"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0169-7552(88)90064-5","volume":"15","author":"K. Sabnani","year":"1988","unstructured":"Sabnani, K., Dahbura, A.: A protocol test generation procedure. Computer Networks and ISDN Systems\u00a015, 285\u2013297 (1988)","journal-title":"Computer Networks and ISDN Systems"},{"key":"16_CR16","unstructured":"Wool, A.: Architecting the lumeta firewall analyzer. In: Proceedings of the 10th USENIX Security Symposium, August 2001, pp. 85\u201397 (2001)"}],"container-title":["Lecture Notes in Computer Science","Testing of Communicating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11430230_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T21:18:12Z","timestamp":1559251092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11430230_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540260547","9783540320760"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11430230_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}