{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:33:17Z","timestamp":1742913197434,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642397172"},{"type":"electronic","value":"9783642397189"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39718-9_7","type":"book-chapter","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T23:01:54Z","timestamp":1377817314000},"page":"112-121","source":"Crossref","is-referenced-by-count":3,"title":["hol-TestGen\/fw"],"prefix":"10.1007","author":[{"given":"Achim D.","family":"Brucker","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Br\u00fcgger","sequence":"additional","affiliation":[]},{"given":"Burkhart","family":"Wolff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"von Bidder, D.: Specification-based firewall testing. Ph.d. thesis, ETH Zurich, ETH Dissertation No. 17172. Diana von Bidder\u2019s maiden name is Diana Senn (2007)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Br\u00fcgger, L., Kearney, P., Wolff, B.: Verified firewall policy transformations for test-case generation. In: Third International Conference on Software Testing, Verification, and Validation (ICST) , pp. 345\u2013354. IEEE Computer Society (2010), doi:10.1109\/ICST.2010.50","DOI":"10.1109\/ICST.2010.50"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Br\u00fcgger, L., Kearney, P., Wolff, B.: An approach to modular and testable security models of real-world health-care applications. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 133\u2013142. ACM Press (2011), doi:10.1145\/1998441.1998461","DOI":"10.1145\/1998441.1998461"},{"key":"7_CR4","unstructured":"Brucker, A.D., Br\u00fcgger, L., Wolff, B.: Formal firewall testing: An exercise in test and proof. Submitted for publication (2013)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-73770-4_9","volume-title":"Tests and Proofs","author":"A.D. Brucker","year":"2007","unstructured":"Brucker, A.D., Wolff, B.: Test-sequence generation with Hol-TestGen with an application to firewall testing. In: Gurevich, Y., Meyer, B. (eds.) TAP 2007. LNCS, vol.\u00a04454, pp. 149\u2013168. Springer, Heidelberg (2007)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-00593-0_28","volume-title":"Fundamental Approaches to Software Engineering","author":"A.D. Brucker","year":"2009","unstructured":"Brucker, A.D., Wolff, B.: hol-testGen. In: Chechik, M., Wirsing, M. (eds.) FASE 2009. LNCS, vol.\u00a05503, pp. 417\u2013420. Springer, Heidelberg (2009)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Wolff, B.: On theorem prover-based testing. Formal Aspects of Computing, FAC (2012), doi:10.1007\/s00165-012-0222-y","DOI":"10.1007\/s00165-012-0222-y"},{"key":"7_CR8","unstructured":"Br\u00fcgger, L.: A framework for modelling and testing of security policies. Ph.D. thesis, ETH Zurich, ETH Dissertation No. 20513 (2012)"},{"key":"7_CR9","unstructured":"El-Atawy, A., Ibrahim, K., Hamed, H., Al-Shaer, E.: Policy segmentation for intelligent firewall testing. In: NPSec 2005, pp. 67\u201372. IEEE Computer Society (2005)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"El-Atawy, A., Samak, T., Wali, Z., Al-Shaer, E., Lin, F., Pham, C., Li, S.: An automated framework for validating firewall policy enforcement. In: POLICY 2007, pp. 151\u2013160. IEEE Computer Society (2007)","DOI":"10.1109\/POLICY.2007.5"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/3-540-45575-2_31","volume-title":"Perspectives of System Informatics","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J., Wimmel, G.: Specification-based testing of firewalls. In: Bj\u00f8rner, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol.\u00a02244, pp. 308\u2013316. Springer, Heidelberg (2001)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L. Moura de","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.S.: Z3: An efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol.\u00a04963, pp. 337\u2013340. Springer, Heidelberg (2008)"},{"key":"7_CR13","unstructured":"PIDE (2013), \n                  \n                    http:\/\/fortesse.lri.fr\/index.php?option=com_content&id=91&Itemid=60#PlatformDevelopment"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11430230_16","volume-title":"Testing of Communicating Systems","author":"D. Senn","year":"2005","unstructured":"Senn, D., Basin, D.A., Caronni, G.: Firewall conformance testing. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol.\u00a03502, pp. 226\u2013241. Springer, Heidelberg (2005)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-74591-4_26","volume-title":"Theorem Proving in Higher Order Logics","author":"M. Wenzel","year":"2007","unstructured":"Wenzel, M., Wolff, B.: Building formal method tools in the Isabelle\/Isar framework. In: Schneider, K., Brandt, J. (eds.) TPHOLs 2007. LNCS, vol.\u00a04732, pp. 352\u2013367. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2013"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39718-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T22:38:05Z","timestamp":1578523085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39718-9_7"}},"subtitle":["An Environment for Specification-Based Firewall Conformance Testing"],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397172","9783642397189"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39718-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}