{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:50:53Z","timestamp":1729612253565,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/ictel.2009.5158616","type":"proceedings-article","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T18:18:41Z","timestamp":1246990721000},"page":"41-46","source":"Crossref","is-referenced-by-count":5,"title":["Towards a test cases generation method for Security Policies"],"prefix":"10.1109","author":[{"given":"Ryma","family":"Abbassi","sequence":"first","affiliation":[]},{"given":"Sihem Guemara","family":"El Fatmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"115","article-title":"On-the-fly conformance testing using spin","author":"de vries","year":"1998","journal-title":"Fourth Workshop on Automata Theoretic Verification with the Spin Model Checker ENST 98 S 002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2008.4757489"},{"key":"ref12","first-page":"42","article-title":"Auto-generating Test Sequences Using Model Checkers: A Case Study","author":"heimdahl","year":"2003","journal-title":"Third Internat Workshop on Formal Approaches to Soft Testing (FATES)"},{"key":"ref13","article-title":"Test generation with inputs, outputs and repetitive quiescence","author":"tretmans","year":"0","journal-title":"Technical Report No 96&#x2013;26 Centre for Telematics and Information Technology"},{"key":"ref14","article-title":"Specification-based test generation with TGV","author":"calam\u00e9","year":"2005","journal-title":"Technical Report"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-71549-5"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s10009-004-0153-x","article-title":"TGV: theory, principles and algorithms","volume":"7","author":"jard","year":"2005","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2008.41"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.124"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989798"},{"year":"1992","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.52"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266860"},{"article-title":"Design and Validation of Communication Protocols","year":"1991","author":"holzmann","key":"ref9"},{"key":"ref1","article-title":"Test Generation from Security Policies Specified in Or-BAC","author":"kequin","year":"2007","journal-title":"Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007)"}],"event":{"name":"2009 International Conference on Telecommunications","start":{"date-parts":[[2009,5,25]]},"location":"Marrakech, Morroco","end":{"date-parts":[[2009,5,27]]}},"container-title":["2009 International Conference on Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5089941\/5158601\/05158616.pdf?arnumber=5158616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:39:14Z","timestamp":1497807554000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5158616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ictel.2009.5158616","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}