2012 7th International Workshop on Automation of Software Test (AST) 2012
DOI: 10.1109/iwast.2012.6228997
|View full text |Cite
|
Sign up to set email alerts
|

Testing of PolPA authorization systems

Abstract: The implementation of an authorization system is a critical and error-prone activity that requires a careful verification and testing process. As a matter of fact, errors in the authorization system code could grant accesses that should instead be denied, thus jeopardizing the security of the protected system. In this paper, we address the testing of the implementation of the Policy Decision Point (PDP) within the PolPA authorization system that enables history-based and usage-based control of accesses. Accord… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 18 publications
(27 reference statements)
0
8
0
Order By: Relevance
“…Model-based testing approaches are capable of generating test cases based on interaction protocol specifications [16], [17] and thus can potentially generate test cases for complex attack scenarios [18]. Model-based security testing is a relatively new research field [46], where some approaches have been proposed for security vulnerability testing (e.g., [50], [51], [52], [53], [54], [55], [56], [57], [58], [59]). For instance, Marback et al [53] propose a model-based security testing approach that automatically generates security test sequences from threat trees.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Model-based testing approaches are capable of generating test cases based on interaction protocol specifications [16], [17] and thus can potentially generate test cases for complex attack scenarios [18]. Model-based security testing is a relatively new research field [46], where some approaches have been proposed for security vulnerability testing (e.g., [50], [51], [52], [53], [54], [55], [56], [57], [58], [59]). For instance, Marback et al [53] propose a model-based security testing approach that automatically generates security test sequences from threat trees.…”
Section: Related Workmentioning
confidence: 99%
“…Jürjens [54] relies on some security extensions of UML, i.e., UMLsec [64], [65], [66], to generate security vulnerability test cases from detailed UML statecharts capturing control and data-flow. Bertolino et al [50] present a model-based approach for the automatic generation of test cases for security policies specified in a process algebra language. All these approaches require detailed formal models, which limits their adoption in industrial settings.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, they describe a prototype implementation for GRID computational services, and they show how the proposed language can be used to define a security policy that regulates the network usage to protect the local computational service from the applications executed on behalf of remote GRID users. The Usage Control authorization system prototype has been validated through a proper testing process described in [46].…”
Section: Usage Control Modelmentioning
confidence: 99%
“…[36], the authors have proposed a model-based testing approach to test PolPA authorizations systems. PolPA authorizations systems are based on a process-algebraic language to specify policies according to UCON [17].…”
Section: Access Control Test Generationmentioning
confidence: 99%