Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering 2012
DOI: 10.1145/2351676.2351719
|View full text |Cite
|
Sign up to set email alerts
|

Selection of regression system tests for security policy evolution

Abstract: As security requirements of software often change, developers may modify security policies such as access control policies (policies in short) according to evolving requirements. To increase confidence that the modification of policies is correct, developers conduct regression testing. However, rerunning all of existing system test cases could be costly and time-consuming. To address this issue, we develop a regression-test-selection approach, which selects every system test case that may reveal regression fau… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…The policy set target (line 3) is empty, which means that it applies to any subject, resource, action and environment. The policy target (lines [5][6][7][8][9][10][11][12] says that this policy applies to any subject, any action, any environment and the "books" resource. This policy has a first rule (ruleA) (lines 13-34) with a target (lines [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33] specifying that this rule applies only to the access requests of a "read" action of "books", and "documents" resources with any environment.…”
Section: Xacml Languagementioning
confidence: 99%
See 4 more Smart Citations
“…The policy set target (line 3) is empty, which means that it applies to any subject, resource, action and environment. The policy target (lines [5][6][7][8][9][10][11][12] says that this policy applies to any subject, any action, any environment and the "books" resource. This policy has a first rule (ruleA) (lines 13-34) with a target (lines [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33] specifying that this rule applies only to the access requests of a "read" action of "books", and "documents" resources with any environment.…”
Section: Xacml Languagementioning
confidence: 99%
“…One of the objectives of this paper is to improve the trustworthiness of the experimental analysis presented in previous related works (like [6] and [7]) by using a larger and more representative set of XACML policies. Thus, we include in the experiment six real world policies, which differ from each other in terms of the complexity of their structure and the number of elements they include.…”
Section: A Policies Detailsmentioning
confidence: 99%
See 3 more Smart Citations