Now showing items 1-2 of 2
The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of ...
Mutation-based evaluation of weighted test case selection for firewall testing
As part of network security testing an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting black-box testing and evaluation methodologies can be helpful. In ...