Validating security protocols with cloud-based middleboxes | IEEE Conference Publication | IEEE Xplore