Search
Now showing items 1-2 of 2
The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
(IEEE, 2009)
Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of ...
Event-based input validation using design-by-contract patterns
(IEEE, 2009)
This paper proposes an approach for validation of numerical inputs based on graphical user interfaces (GUI) that are modeled and specified by event sequence graphs (ESG). For considering complex structures of input data, ...