–sourcefile– –revision– 2010-04-08 –time– –owner–
Verified Firewall Policy Transformations for Test Case Generation
Achim D. Brucker1 Lukas Br¨ ugger2 Paul Kearney3 Burkhart Wolff4
1SAP Research, Germany 2Information Security, ETH Z¨
urich, Switzerland
3Security Futures Practice, BT Innovate & Design, UK 4Universit´
e Paris-Sud, France
ICST 2010
Brucker, Br¨ ugger, Kearney, Wolff () Verified Policy Transformations ICST 2010 1 / 27