Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lukas Brügger
@article{DBLP:journals/afp/BruckerBW17, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Burkhart Wolff}, title = {Formal Network Models and Their Application to Firewall Policies}, journal = {Arch. Formal Proofs}, volume = {2017}, year = {2017}, url = {https://www.isa-afp.org/entries/UPF\_Firewall.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/BruckerBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/BruckerBW15, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Burkhart Wolff}, title = {Formal firewall conformance testing: an application of test and proof techniques}, journal = {Softw. Test. Verification Reliab.}, volume = {25}, number = {1}, pages = {34--71}, year = {2015}, url = {https://doi.org/10.1002/stvr.1544}, doi = {10.1002/STVR.1544}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/BruckerBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/BruckerBW14, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Burkhart Wolff}, title = {The Unified Policy Framework {(UPF)}}, journal = {Arch. Formal Proofs}, volume = {2014}, year = {2014}, url = {https://www.isa-afp.org/entries/UPF.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/BruckerBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/BruckerBW13, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Burkhart Wolff}, editor = {Zhiming Liu and Jim Woodcock and Huibiao Zhu}, title = {hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8049}, pages = {112--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39718-9\_7}, doi = {10.1007/978-3-642-39718-9\_7}, timestamp = {Fri, 17 Feb 2023 09:02:01 +0100}, biburl = {https://dblp.org/rec/conf/ictac/BruckerBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Brugger12, author = {Lukas Br{\"{u}}gger}, title = {A framework for modelling and testing of security policies}, school = {{ETH} Zurich, Z{\"{u}}rich, Switzerland}, year = {2012}, url = {https://hdl.handle.net/20.500.11850/58551}, doi = {10.3929/ETHZ-A-007575139}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Brugger12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BruckerBKW11, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Paul J. Kearney and Burkhart Wolff}, editor = {Ruth Breu and Jason Crampton and Jorge Lobo}, title = {An approach to modular and testable security models of real-world health-care applications}, booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings}, pages = {133--142}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998441.1998461}, doi = {10.1145/1998441.1998461}, timestamp = {Sat, 28 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BruckerBKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/BruckerBKW10, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Paul J. Kearney and Burkhart Wolff}, title = {Verified Firewall Policy Transformations for Test Case Generation}, booktitle = {Third International Conference on Software Testing, Verification and Validation, {ICST} 2010, Paris, France, April 7-9, 2010}, pages = {345--354}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICST.2010.50}, doi = {10.1109/ICST.2010.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/BruckerBKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/BruckerBW08, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Burkhart Wolff}, editor = {Kenji Suzuki and Teruo Higashino and Andreas Ulrich and Toru Hasegawa}, title = {Model-Based Firewall Conformance Testing}, booktitle = {Testing of Software and Communicating Systems, 20th {IFIP} {TC} 6/WG 6.1 International Conference, TestCom 2008, 8th International Workshop, {FATES} 2008, Tokyo, Japan, June 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5047}, pages = {103--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68524-1\_9}, doi = {10.1007/978-3-540-68524-1\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/pts/BruckerBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BruckerBW08, author = {Achim D. Brucker and Lukas Br{\"{u}}gger and Burkhart Wolff}, editor = {Bernd Finkbeiner and Yuri Gurevich and Alexander K. Petrenko}, title = {Verifying Test-Hypotheses: An Experiment in Test and Proof}, booktitle = {Proceedings of the Fourth Workshop on Model Based Testing, MBT@ETAPS 2008, Budapest, Hungary, March 30, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {220}, number = {1}, pages = {15--27}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2008.11.003}, doi = {10.1016/J.ENTCS.2008.11.003}, timestamp = {Fri, 17 Feb 2023 11:06:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BruckerBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.