Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/ICST.2008.44guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Model-Based Tests for Access Control Policies

Published: 09 April 2008 Publication History

Abstract

We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points.

Cited By

View all
  • (2021)RBAC protection-impacting changes identificationInformation and Software Technology10.1016/j.infsof.2021.106630139:COnline publication date: 23-Aug-2021
  • (2019)Methods and Tools for Policy AnalysisACM Computing Surveys10.1145/329574951:6(1-35)Online publication date: 4-Feb-2019
  • (2019)Complementary test selection criteria for model-based testing of security componentsInternational Journal on Software Tools for Technology Transfer (STTT)10.1007/s10009-018-0489-221:4(425-448)Online publication date: 1-Aug-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICST '08: Proceedings of the 2008 International Conference on Software Testing, Verification, and Validation
April 2008
540 pages
ISBN:9780769531274

Publisher

IEEE Computer Society

United States

Publication History

Published: 09 April 2008

Author Tags

  1. Access Control
  2. Combinatorial Testing
  3. Model-Based Testing
  4. Mutation Testing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)RBAC protection-impacting changes identificationInformation and Software Technology10.1016/j.infsof.2021.106630139:COnline publication date: 23-Aug-2021
  • (2019)Methods and Tools for Policy AnalysisACM Computing Surveys10.1145/329574951:6(1-35)Online publication date: 4-Feb-2019
  • (2019)Complementary test selection criteria for model-based testing of security componentsInternational Journal on Software Tools for Technology Transfer (STTT)10.1007/s10009-018-0489-221:4(425-448)Online publication date: 1-Aug-2019
  • (2018)An automated model-based test oracle for access control systemsProceedings of the 13th International Workshop on Automation of Software Test10.1145/3194733.3194743(2-8)Online publication date: 28-May-2018
  • (2018)Combining Algorithm Based Data Flow Testing Approach for XACMLProceedings of the Third ACM Workshop on Attribute-Based Access Control10.1145/3180457.3180461(25-31)Online publication date: 14-Mar-2018
  • (2015)Assessment of access control systems using mutation testingProceedings of the First International Workshop on TEchnical and LEgal aspects of data pRIvacy10.5555/2821464.2821469(8-13)Online publication date: 16-May-2015
  • (2015)Automated Inference of Access Control Policies for Web ApplicationsProceedings of the 20th ACM Symposium on Access Control Models and Technologies10.1145/2752952.2752969(27-37)Online publication date: 1-Jun-2015
  • (2014)Modeling test cases for security protocols with SecureMDDComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.08.02458(99-111)Online publication date: 1-Jan-2014
  • (2012)Testing of PolPA authorization systemsProceedings of the 7th International Workshop on Automation of Software Test10.5555/2663608.2663611(8-14)Online publication date: 2-Jun-2012
  • (2012)A model-based approach to automated testing of access control policiesProceedings of the 17th ACM symposium on Access Control Models and Technologies10.1145/2295136.2295173(209-218)Online publication date: 20-Jun-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media