2013
DOI: 10.1007/s11219-013-9216-0
|View full text |Cite
|
Sign up to set email alerts
|

Testing of PolPA-based usage control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…This section presents mutation-based approaches related to security. More precisely, applications on testing security policies [309][310][311][312][313], regression testing of security policies [314] and testing security protocols [315] are shortly described.…”
Section: Security Testingmentioning
confidence: 99%
“…This section presents mutation-based approaches related to security. More precisely, applications on testing security policies [309][310][311][312][313], regression testing of security policies [314] and testing security protocols [315] are shortly described.…”
Section: Security Testingmentioning
confidence: 99%
“…For paths having the same verdict, the evaluation order of the paths is based on their length, namely the shortest path takes the precedence. For the policy of Listing 1, the order of the evaluated paths is (1), (4), (2) and (3).…”
Section: Test Oraclementioning
confidence: 99%
“…Test cases and oracle derivation. Considering the automated test cases generation, solutions have been proposed for testing either the XACML policy or the PDP implementation [2,3]. Among them, the most referred ones such as X-CREATE and the Targen tools [3,12] use combinatorial approaches for test cases generation.…”
Section: Related Workmentioning
confidence: 99%
“…Models like attack trees [Morais et al 2011], UML state machines [Hussein and Zulkernine 2006], and transition nets [Xu et al 2012], are used to generate sequences of illegal actions, which are not relevant for testing data processing systems where the complexity of the testing process lies in the definition of the input data and mappings to complex, structured outputs. Mutation-based approaches instead alter valid field data or existing test inputs to generate invalid test inputs [Shan and Zhu 2009;Bertolino et al 2014;De Jonge and Visser 2012]. The main limitation of these approaches is that they cannot generate test inputs from scratch to test new data requirements.…”
Section: Related Workmentioning
confidence: 99%