Sciweavers

533 search results - page 22 / 107
» Verification of Distributed Firewalls
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
13 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
CLUSTER
2000
IEEE
14 years 2 months ago
Agilent's Key Technologies in Remote System Management
Agilent Technologies Boeblingen Verification Solutions is offering a variety of remote system management products. This paper will summarize the key technologies on which Agilents...
Michael Herz
CONCUR
1998
Springer
14 years 2 months ago
The Regular Viewpoint on PA-Processes
PA is the process algebra allowing non-determinism, sequential and parallel compositions, and recursion. We suggest viewing PA-processes as trees, and using treeautomata technique...
Denis Lugiez, Ph. Schnoebelen
TSE
2010
120views more  TSE 2010»
13 years 4 months ago
Efficient Software Verification: Statistical Testing Using Automated Search
Statistical testing has been shown to be more efficient at detecting faults in software than other methods of dynamic testing such as random and structural testing. Test data are g...
Simon M. Poulding, John A. Clark
PDSE
1998
126views more  PDSE 1998»
13 years 11 months ago
Validation and Test Generation for Object-Oriented Distributed Software
The development of correct OO distributed software is a daunting task as soon as the distributed interactions are not trivial. This is due to the inherent complexity of distribute...
Thierry Jéron, Jean-Marc Jézé...