{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:33:45Z","timestamp":1762004025717},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540000297"},{"type":"electronic","value":"9783540361039"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36103-0_48","type":"book-chapter","created":{"date-parts":[[2007,5,16]],"date-time":"2007-05-16T03:15:07Z","timestamp":1179285307000},"page":"471-482","source":"Crossref","is-referenced-by-count":29,"title":["Specification-Based Test Generation for Security-Critical Systems Using Mutations"],"prefix":"10.1007","author":[{"given":"Guido","family":"Wimmel","sequence":"first","affiliation":[]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"48_CR1","series-title":"Lect Notes Comput Sci","volume-title":"TACS\u2019 01","author":"M. Abadi","year":"2001","unstructured":"M. Abadi and J. J\u00fcrjens. Formal eavesdropping and its computational interpretation. In TACS\u2019 01, volume 2215 of LNCS. Springer, 2001."},{"key":"48_CR2","unstructured":"T. Aslam, I. Krsul, and E. Spafford. Use of A Taxonomy of Security Faults. In 19th National Information Systems Security Conference, Baltimore, 1996."},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"M. Broy and K. Stolen, editors. Specification and Development of Interactive Systems. Springer, 2001.","DOI":"10.1007\/978-1-4613-0091-5"},{"key":"48_CR4","unstructured":"CEPSCO. Common Electronic Purse Specifications, 2001. Available at http:\/\/www.cepsco.com ."},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"J. Dushina, M. Benjamin, and D. Geist. Semi-Formal Test Generation with Genevieve. In DAC, 2001.","DOI":"10.1145\/378239.379035"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"J. Dick and A. Faivre. Automating the generation and sequencing of test cases from model-based specifications. In FME\u2019 93, pages 268\u2013284, 1993.","DOI":"10.1007\/BFb0024651"},{"issue":"8","key":"48_CR7","first-page":"695","volume":"22","author":"S. Gritzalis","year":"1999","unstructured":"S. Gritzalis, D. Spinellis, and P. Georgiadis. Security protocols over open networks and distributed systems. Comp. Communic., 22(8):695\u2013707, 1999.","journal-title":"Comp. Communic."},{"key":"48_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/BFb0027283","volume-title":"ZUM\u2019 97","author":"S. Helke","year":"1997","unstructured":"S. Helke, T. Neustupny, and T. Santen. Automating Test Case Generation from Z Specifications with Isabelle. In ZUM\u2019 97, volume 1212 of LNCS, pages 52\u201371. Springer, 1997."},{"key":"48_CR9","unstructured":"Jan J\u00fcrjens and Guido Wimmel. Security modelling for electronic commerce: The Common Electronic Purse Specifications. In First IFIP conference on e-commerce, e-business, and e-government (I3E). Kluwer, 2001."},{"key":"48_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Andrei Ershov 4th International Conference \u201dPerspectives of System Informatics\u201d (PSI\u201901)","author":"J. J\u00fcrjens","year":"2001","unstructured":"Jan J\u00fcrjens and Guido Wimmel. Specification-based testing of firewalls. In Andrei Ershov 4th International Conference \u201dPerspectives of System Informatics\u201d (PSI\u201901), LNCS. Springer, 2001."},{"key":"48_CR11","unstructured":"H. L\u00f6tzbeyer and A. Pretschner. Testing concurrent reactive systems with constraint logic programming. In 2nd Workshop on Rule-Based Constraint Reasoning and Programming, Singapore, 2000."},{"key":"48_CR12","unstructured":"J. Offutt. Practical Mutation Testing. In 12th International Conference on Testing Computer Software, 1995."},{"key":"48_CR13","unstructured":"J. Offutt, J. Voas, and J. Payne. Mutation Operators for Ada. Technical Report ISSE-TR-96-09, George Mason University, 1996."},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"J. Offutt, Y. Xiong, and S. Liu. Criteria for Generating Specification-based Tests. In IEEE Conf. on Engineering of Complex Computer Systems, 1999.","DOI":"10.1109\/ICECCS.1999.802856"},{"key":"48_CR15","first-page":"53","volume":"19","author":"J. Peleska","year":"1997","unstructured":"J. Peleska and M. Siegel. Test automation of safety-critical reactive systems. South African Computer Jounal, 19:53\u201377, 1997.","journal-title":"South African Computer Jounal"},{"key":"48_CR16","unstructured":"J. Voas and G. McGraw. Software Fault Injection: Inoculating Programs Against Errors. Wiley, 1998."},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"G. Wimmel and J. J\u00fcrjens. Specification-Based Test Generation for Security-Critical Systems Using Mutations, 2002. Long version, available at http:\/\/www4.in.tum.de\/~wimmel\/ .","DOI":"10.1007\/3-540-36103-0_48"},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"G. Wimmel, H. L\u00f6tzbeyer, A. Pretschner, and O. Slotosch. Specification Based Test Sequence Generation with Propositional Logic. Journal on Software Testing Verification and Reliability, 10, 2000.","DOI":"10.1002\/1099-1689(200012)10:4<229::AID-STVR213>3.0.CO;2-O"},{"key":"48_CR19","doi-asserted-by":"crossref","unstructured":"G. Wimmel and A. Wi\u03b2peintner. Extended description techniques for security engineering. In IFIP SEC, 2001.","DOI":"10.1007\/0-306-46998-7_32"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36103-0_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:56:10Z","timestamp":1556412970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36103-0_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000297","9783540361039"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-36103-0_48","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}