2008
DOI: 10.1007/978-3-540-87875-9_38
|View full text |Cite
|
Sign up to set email alerts
|

A Model-Based Framework for Security Policy Specification, Deployment and Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0
1

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 68 publications
(68 citation statements)
references
References 8 publications
0
67
0
1
Order By: Relevance
“…The other uses eXtensible Access Control Markup Language (XACML) to create the actual implementation of a security policy [13,27,28]. Le Traon et al have investigated various issues of testing access control policies, such as test criteria of access control policies [25], test generation from access control models [29], and selection and transformation of functional tests for policy testing [30]. Martin and Xie [13,27,28] have been investigating techniques for test generation from access control policy specifications written in XACML (OASIS XACML).…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The other uses eXtensible Access Control Markup Language (XACML) to create the actual implementation of a security policy [13,27,28]. Le Traon et al have investigated various issues of testing access control policies, such as test criteria of access control policies [25], test generation from access control models [29], and selection and transformation of functional tests for policy testing [30]. Martin and Xie [13,27,28] have been investigating techniques for test generation from access control policy specifications written in XACML (OASIS XACML).…”
Section: Background and Related Workmentioning
confidence: 99%
“…(2) If CurrentNode is in a test sequence that has children with an OR relationship, we create the same number of sequences as children of the CurrentNode and replace CurrentNode in each of these sequences with one of the children of the OR relationship. Then, delete the original sequence containing CurrentNode (lines [24][25][26][27][28][29][30][31][32][33][34][35]. The set of test sequences that remains after the substitutions is the final set of test sequences used for test generation.…”
Section: Test Sequence Generation Algorithmmentioning
confidence: 99%
“…Extracted network topology with the increasing adoption by industry and academy, makes XACML a good choice for a generic access-control representation. Indeed, some works in the model-driven community already chose XACML as a target language as in [3] and [16].…”
Section: Application Scenariosmentioning
confidence: 99%
“…However, several work, including ones by the authors, proposed techniques and tools for automatically testing the security policies (access control policies) [12], [13], [14], [15]. Others TABLE III MOBILE BROWSER VS DESKTOP BROWSER COMPARISON 0 1 2 3 8 9 10 13 14 16 26 28 30 34 35 36 40 42 43 47 48 50 51 53 56 69 70 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 0 1 offer frameworks and techniques to test the systems from its interfaces [16], [17].…”
Section: Related Workmentioning
confidence: 99%