2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops 2013
DOI: 10.1109/icstw.2013.12
|View full text |Cite
|
Sign up to set email alerts
|

Testing Delegation Policy Enforcement via Mutation Analysis

Abstract: Delegation is an important dimension of security that plays a crucial role in the administration mechanism of access control policies. Delegation may be viewed as an exception made to an access control policy in which a user gets right to act on behalf of other users. This meta-level characteristic together with the complexity of delegation itself make it crucial to ensure the correct enforcement and management of delegation policy in a system via testing. To this end, we adopt mutation analysis for delegation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…This section presents mutation-based approaches related to security. More precisely, applications on testing security policies [309][310][311][312][313], regression testing of security policies [314] and testing security protocols [315] are shortly described.…”
Section: Security Testingmentioning
confidence: 99%
“…This section presents mutation-based approaches related to security. More precisely, applications on testing security policies [309][310][311][312][313], regression testing of security policies [314] and testing security protocols [315] are shortly described.…”
Section: Security Testingmentioning
confidence: 99%
“…Besides, in order to complete the framework, we also propose an approach for testing delegation policy enforcement. In this direction, we continue working on the extension of testing delegation policy enforcement via mutation analysis [29].…”
Section: Discussionmentioning
confidence: 99%
“…We keep all the definitions here generic so that they can be mapped into different security models like Role-Based Access Control (Rbac), Organization-Based Access Control (Orbac) [16], Discretionary Access Control (Dac) [19], etc. These definitions also provide the basis for deriving mutation operators that can be used for testing delegation policy enforcement [29]. Then, a brief summary of previous work on dynamic security policy enforcement [24] is given.…”
Section: Introductionmentioning
confidence: 99%
“…Model-based mutation testing has been applied to adaptive systems [2], model-based delegation security policies [7] and logic formula [5]. It has also been used with Simulink models to compare clone-detection algorithms [11].…”
Section: Related Researchmentioning
confidence: 99%
“…Mutation is used in areas like model-based testing, program testing [7], evaluation of clone-detection algorithms [11], generation of large model sets [8], education [9], or evolutionary algorithms [6]. While most of these systems are built ad-hoc, Wodel may automate their construction.…”
Section: Related Researchmentioning
confidence: 99%