Proceedings of the 12th ACM Symposium on Access Control Models and Technologies 2007
DOI: 10.1145/1266840.1266860
|View full text |Cite
|
Sign up to set email alerts
|

A formal approach for testing security rules

Abstract: Nowadays, security policies are the key point of every modern infrastructure. The specification and the testing of such policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. To address both challenges, we propose a framework to specify security policies and test their implementation on a system. Our framework makes it possible to generate in an automatic manner, test sequences, in order to validate the conformance of a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2007
2007
2019
2019

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 10 publications
0
18
0
1
Order By: Relevance
“…It generalizes our previous work that covers testing rules with atomic activities [16] by considering decomposed ones through the conception of new integration algorithms.…”
Section: Related Workmentioning
confidence: 74%
“…It generalizes our previous work that covers testing rules with atomic activities [16] by considering decomposed ones through the conception of new integration algorithms.…”
Section: Related Workmentioning
confidence: 74%
“…In [11], Xie et al proposed a new tool Cirg that automatically generates test for XACML policies using Change-Impact Analysis. Several researchers generate tests from access control policies using various forms of state machines [12], [23]. In addition, Several studies propose the use of fault-injection or mutation targeting different aspects of security testing.…”
Section: B Mutation Resultsmentioning
confidence: 99%
“…The next step is to apply this configuration to our ViewModel. To this end, the JSON-encoded result of the View Service is parsed, and each entry in the result is applied to the local viewModel variable (lines [12][13][14][15].…”
Section: Client-side Updates Of the Viewmodelmentioning
confidence: 99%
“…In [1], Belchior and colleagues model RBAC policies using RDF triples and N3Logic rules. Mallouli et al [13] use extended finite state machines (EFSM) to model systems with OrBAC [11] (Organization Based Access Control) security policies. However, none of these approaches addresses the enforcement of access control policies and entailment constraints in dynamic real-time Web applications.…”
Section: Related Workmentioning
confidence: 99%